← BACK TO HOME

Security at Continur

Last Updated: February 26, 2026

1. Overview

Continur is built on a zero-knowledge architecture. We monitor only metadata signals—event types, timestamps, and service names—to detect user activity. We never see, store, or have access to the content of your emails, messages, code, documents, or files.

Your Succession Map pointers are encrypted with keys derived per user. Even Continur engineers cannot decrypt your vault data. This page describes the specific technical controls behind that promise.

2. Encryption

All sensitive vault data uses envelope encryption powered by AWS Key Management Service (KMS):

3. Authentication

Continur uses passwordless authentication via magic links. There are no passwords to store, leak, or breach.

4. Activity Monitoring

Continur’s Pulse system watches for signs of life across services you connect. Here is what we do and do not access:

5. Infrastructure

Continur runs on a fully serverless AWS architecture:

6. Data Lifecycle

7. Access Controls

8. Third-Party Services

We use a small set of trusted vendors, each with a limited scope of data access:

9. Contact

If you have security questions, want to report a vulnerability, or need details about our security practices, contact us at:

Verum SG LLC
Email: security@verumsg.com
General support: support@verumsg.com