Last updated on Last updated: 21 Nov 2025
This page provides a more detailed overview of the security practices used by Efficient Dollar. It is intended for users who want a deeper understanding of how we protect data, including developers, security-conscious individuals, and potential partners.
For a higher-level summary, see our Security page. For information on privacy and financial data, see our Privacy Policy and Data Protection Notice.
Efficient Dollar is built as a modern web application with the following characteristics:
We follow a defense-in-depth approach, layering controls at the network, application, and data levels.
All traffic between client devices and Efficient Dollar is encrypted using TLS (HTTPS).
We:
Users should keep their browsers and operating systems updated to benefit from the latest security improvements.
Application data is stored in managed databases and storage services that provide encryption at rest.
Where applicable, we:
Financial credential handling is delegated to providers such as Plaid and payment processors (e.g., Stripe for future subscriptions).
Efficient Dollar uses a modern authentication system that supports:
We avoid storing plain-text passwords. When password-based auth is used, passwords are processed using industry-standard hashing algorithms.
We implement server-side checks to ensure that users can only access:
We design APIs and database queries to enforce authorization decisions on the server, rather than relying solely on client logic.
We use a combination of:
These measures help protect against common vulnerabilities such as injection attacks and cross-site scripting (XSS).
Efficient Dollar runs on reputable cloud and hosting providers that implement strong physical and network security controls.
Our practices include:
We avoid ad-hoc changes on production systems and prefer configuration-as-code where practical.
We treat secrets such as API keys, database credentials, and signing keys with care.
Our approach includes:
We also aim to minimize the number of services and components that have access to each secret.
When bank connectivity via Plaid is enabled, our security posture will include:
For more details on data flows and legal bases, see the Data Protection Notice.
When paid plans are available, we plan to:
This separation reduces the scope of systems that handle payment-related data.
We maintain logs to help:
Where possible, logs avoid storing sensitive personal or financial data. Access to logs is restricted to authorized personnel.
We apply the principle of least privilege across systems and roles. This means:
We rely on provider-level or managed backup mechanisms for critical data. Our goal is to:
Backups are subject to the same security controls (such as encryption) as primary storage.
We aim to keep dependencies and platform components reasonably up to date.
Our practices include:
We encourage responsible disclosure from external researchers and users who find potential issues (see the Security page for contact details).
While we take security seriously, users also play an important role in protecting their accounts. We encourage you to:
If you suspect unauthorized access to your account or data, contact us immediately at support@efficientdollar.com.
As Efficient Dollar grows and introduces new features (such as Plaid integrations and subscription plans), we may update these Security Practices.
We will revise the “Last updated” date at the top of this page, and in some cases may provide additional notice through the application or via email.
If you have any questions about these practices, please contact us at support@efficientdollar.com.