The Estate Executor Status Tracker handles sensitive legal documents — death certificates, wills, financial records, and estate inventories. We take the security of these documents seriously. This page describes the security measures built into the Service.
The Service uses magic-link authentication. There are no passwords to create, remember, steal, or guess. When you access the Service, you enter your email address and receive a secure, one-time login link. This eliminates the entire category of password-based attacks — including credential stuffing, brute force, and password spraying.
All data transmitted between your browser and the Service is encrypted using HTTPS (TLS). Magic links, document uploads, and all page requests are encrypted in transit. The Service does not accept unencrypted HTTP connections.
Every uploaded document is protected by multiple layers:
Attorney sessions are protected with:
The Service limits the number of requests from any single IP address or email address. Automated form submissions are detected and silently neutralized. Login links use 256-bit random tokens — guessing a valid token is computationally infeasible.
Documents are stored using a dual-write architecture: on the server filesystem and in the PostgreSQL database. If a file is lost from the filesystem, it is automatically restored from the database backup. Nightly off-host backups provide an independent copy stored on separate infrastructure.
Every significant action — logins, uploads, reviews, rejections, deletions, case closures — is permanently recorded in an append-only audit log. This log cannot be modified or deleted. It serves as the legal chain of custody for every document in every case.
Two risks exist in this system and in every comparable cloud-hosted legal technology platform:
If an attacker gains control of your email inbox, they could receive login links. We strongly recommend enabling two-factor authentication on your email account.
If the cloud server were compromised at the operating system level, an attacker with server access could theoretically access data directly. This is mitigated through server hardening, firewall rules, and encrypted backups.
Both risks are mitigated by standard operational practices and are documented transparently.
Security questions or concerns may be directed to: support@estateexecutortracker.com