Security
Hivenet's Security
At Hivenet, we prioritize the security and privacy of our users’ data across our network. Here’s a breakdown of our approach to security for Compute with Hivenet, detailing the differences between Hivenet-Certified and Community/Spot providers, along with the specific measures we take to protect your data.
Hivenet-Certified Providers
- Audited and Supported: Hivenet-certified providers have undergone an audit to ensure they meet our rigorous security standards, and we stand behind their compliance.
- Dedicated Machines and Isolated Locations: Hivenet-certified providers use dedicated machines housed in secure, isolated locations with controlled access to minimize security and privacy risks.
- Strict Terms & Service Agreements: Our Terms of Service and Service Level Agreement (SLA) with Hivenet-certified hosts explicitly prohibit hosts from inspecting user instance data or monitoring usage patterns.
Community/Spot Providers
- Not Audited by Hivenet: Community and spot instances are sourced from unverified providers, including idle high-end gaming computers. These resources can introduce security and privacy risks depending on the user’s specific needs.
- Potential Risks: Given that spot instances operate on crowd-sourced hardware, they may present a higher level of security risk. We encourage users with sensitive workloads to use Hive-certified providers for enhanced security.
Terms of Service and SLA with Hive-Certified Hosts
Our Terms of Service (T&S) and Service Level Agreement (Explicitly prohibit Hivenet-certified hosts from attempting to inspect user data, monitor usage patterns, or interfere with instances. This ensures that users’ data privacy is maintained at all times when using Hivenet-certified infrastructure.