Security
Whistler is built to protect whistleblowers and ensure reports remain strictly confidential.
Encryption in transit
All connections to Whistler are encrypted using HTTPS. We enforce strict transport security to ensure that your browser always connects over an encrypted channel, protecting data as it travels between your device and our servers.
Encryption at rest
Whistleblower report data is encrypted at the application level using industry-standard encryption. Each field within a report is encrypted individually, providing granular protection for all sensitive content, contact details, and file attachments.
Even in the unlikely event of unauthorised access to our database, report content would remain unreadable without the correct passkey.
Passkey-protected reports
Encrypted reports can only be decrypted using a passkey that is managed by your organisation. Whistler staff — including developers and administrators — cannot access your report content.
Access within your organisation is controlled through defined roles. Only users who have been explicitly authorised by your Primary Account Holder can view and manage reports.
Authentication and account security
Whistler enforces strong password requirements and stores passwords using an industry-standard one-way hashing algorithm. Passwords are never stored in plain text and cannot be retrieved — even by us.
Accounts are automatically locked after repeated failed login attempts, and sessions expire after a period of inactivity. We also detect and invalidate sessions that show signs of being compromised.
Application security
Whistler employs multiple layers of protection against common web-based attacks. This includes cross-site request forgery protection, strict content security policies, input validation and sanitisation, and comprehensive rate limiting to guard against abuse.
All user-uploaded files are validated for type and size before being accepted and encrypted.
Secure infrastructure
Whistler is hosted on Render, a cloud platform that runs on infrastructure with SOC 2 Type II certification. All database connections are encrypted, and access to production systems is strictly restricted.
Data handling and deletion
When reports are deleted, all encrypted content and attached files are permanently removed. When user accounts are deleted, personal information is anonymised. All deletions are recorded in an audit trail for accountability.
For more detail on how we handle your data, please see our Privacy Policy.
Responsible disclosure
If you believe you have found a security vulnerability in Whistler, please report it to us at security@whistlr.app. We take all reports seriously and will respond promptly.
Still have questions?
Please get in touch — we'd be happy to help.