Security Policy
Effective Date: December 1, 2025 | Last Updated: November 30, 2025
1. OUR COMMITMENT TO SECURITY
At Lynkbee (operated by Groupbox Ltd.), we take security seriously. This Security Policy outlines the measures we implement to protect our platform, our users, and the broader internet community from malicious activities, abuse, and security threats.
Security First: We implement multi-layered security controls, continuous monitoring, and proactive threat detection to ensure Lynkbee remains a safe and trusted platform for link management and analytics.
2. DATA PROTECTION AND ENCRYPTION
2.1 Encryption Standards
All data transmitted to and from Lynkbee is protected using industry-standard encryption:
- Data in Transit: All connections use TLS 1.2 or higher with strong cipher suites to prevent eavesdropping and man-in-the-middle attacks
- Data at Rest: Sensitive user data is encrypted using AES-256 encryption in our databases and storage systems
- Password Security: User passwords are hashed using bcrypt with individual salts, making them computationally infeasible to reverse-engineer
2.2 Access Controls
We implement strict access controls to protect user data:
- Role-based access control (RBAC) for internal systems
- Principle of least privilege for all employee and system access
- Regular access reviews and audit logging for compliance
3. INFRASTRUCTURE SECURITY
3.1 Cloud Security
Lynkbee is hosted on secure, compliant cloud infrastructure with:
- Geographically distributed data centers with physical security controls
- Automated backups with encryption and disaster recovery capabilities
- Network segmentation and firewall protection to isolate services
- Regular security patches and vulnerability management
3.2 Application Security
We follow secure software development practices throughout our development lifecycle:
- Input validation and sanitization to prevent injection attacks (SQL, XSS, etc.)
- CSRF protection for all state-changing operations
- Rate limiting and bot detection to prevent abuse and DDoS attacks
- Security headers (HSTS, CSP, X-Frame-Options) to protect against common web vulnerabilities
- Regular security audits, penetration testing, and code reviews
4. THREAT DETECTION AND PREVENTION
4.1 Bot Detection
Lynkbee uses advanced bot detection powered by advanced technologies to identify and filter non-human traffic. This ensures:
- Accurate analytics and click data for link owners
- Protection against automated attacks and scraping
- Prevention of fraudulent click inflation
4.2 IP Reputation and Abuse Prevention
We integrate with leading threat intelligence services to protect our platform:
- AbuseIPDB Integration: Real-time IP reputation checking to identify and block malicious actors
- CrowdSec: Community-driven threat intelligence to detect and respond to emerging threats
- Rate Limiting: Proof-of-Work challenges and exponential backoff to prevent brute-force attacks
- Geoblocking: Ability to block traffic from high-risk regions or IP ranges
4.3 Malicious Link Detection
We proactively monitor and block links used for malicious purposes:
- Automated scanning for phishing, malware, and scam websites
- Integration with threat intelligence feeds to identify known malicious domains
- User reporting system for suspicious links (See Section 6 below)
- Manual review by our security team for flagged content
5. ACCOUNT SECURITY
5.1 Authentication
Lynkbee supports multiple authentication methods to balance security and convenience:
- Email and Password: Traditional authentication with strong password requirements
- OAuth 2.0: Secure sign-in with Google, Microsoft, and Facebook
5.2 Session Management
We implement secure session handling to prevent unauthorized access:
- Session tokens expire after a period of inactivity
- Secure, HTTP-only cookies to prevent XSS-based session hijacking
- Automatic logout after extended periods of inactivity
- Logout on all devices functionality for compromised accounts
6. ABUSE PREVENTION AND REPORTING
6.1 Zero Tolerance Policy
Lynkbee has a strict zero-tolerance policy for abuse. We do not permit the following activities on our platform:
- Phishing, scams, or fraudulent schemes designed to deceive users
- Distribution of malware, viruses, ransomware, or other malicious software
- Spam, unsolicited bulk messages, or deceptive marketing practices
- Harassment, hate speech, or content that incites violence
- Copyright infringement or intellectual property violations
- Child exploitation material (CSAM) or any illegal content
- Any activity that violates our Terms of Service or applicable laws
Violation of this policy will result in immediate account suspension or termination and may be reported to law enforcement authorities.
6.2 How to Report Abuse
🚨 Report Suspicious Activity
If you encounter a Lynkbee shortened link that appears to be malicious, fraudulent, or in violation of our policies, please contact us immediately.
Contact Methods:
- Email our security team security@lynkb.ee
- Use our contact form with "Security Issue" as the subject
- Provide the suspicious link URL and a detailed description of the issue
Our Response: We review all abuse reports within 24 hours. Confirmed violations result in:
- Immediate suspension of the malicious link
- Account termination for the link owner
- Reporting to AbuseIPDB and CrowdSec to protect the wider community
- Cooperation with law enforcement if required by law
7. VULNERABILITY DISCLOSURE
7.1 Responsible Disclosure
We value the security community's contributions to keeping Lynkbee safe. If you discover a security vulnerability, we ask that you:
- Report the issue privately to our security team security@lynkb.ee
- Provide sufficient detail to reproduce the vulnerability
- Allow us reasonable time to address the issue before public disclosure
- Do not exploit the vulnerability beyond proof-of-concept testing
7.2 Bug Bounty Program
While we do not currently offer a formal bug bounty program, we deeply appreciate responsible disclosure. Researchers who identify critical vulnerabilities will be acknowledged (with permission) on our security acknowledgements page.
8. PRIVACY AND DATA MINIMIZATION
Security and privacy go hand-in-hand. Lynkbee follows the principle of data minimization:
- We do NOT sell your data to third parties, advertisers, or data brokers
- We do NOT track you outside of Lynkbee links or across the web
- We anonymize IP addresses immediately after geolocation lookup to protect link visitors
- We collect only what's necessary to provide our service and generate meaningful analytics
For more details on data handling, see our Privacy Policy.
9. COMPLIANCE AND CERTIFICATIONS
Lynkbee is committed to compliance with applicable data protection and security regulations:
- GDPR Compliance: We adhere to the General Data Protection Regulation for users in the European Economic Area (EEA) and United Kingdom
- Data Protection Act 2018: Compliance with UK data protection laws
- PCI DSS: Payment card data is handled exclusively by PCI-compliant third-party processors (Stripe, PayPal)
10. INCIDENT RESPONSE
10.1 Security Incident Handling
In the event of a security incident, we have an incident response plan in place:
- Immediate containment and mitigation to prevent further damage
- Forensic investigation to determine root cause and scope
- Notification to affected users as required by applicable laws (e.g., GDPR breach notification)
- Post-incident review and implementation of corrective measures
10.2 Breach Notification
If a data breach occurs that may affect your personal information, we will:
- Notify you via email within 72 hours (as required by GDPR)
- Provide details on the nature of the breach and data affected
- Outline the steps we are taking to remediate the issue
- Advise on actions you can take to protect yourself (e.g., password reset)
11. EMPLOYEE TRAINING AND AWARENESS
Security is a shared responsibility. All Lynkbee employees undergo:
- Mandatory security awareness training upon onboarding
- Annual refresher training on evolving threats and best practices
- Phishing simulation exercises to reinforce vigilance
- Confidentiality agreements and adherence to data protection policies
12. UPDATES TO THIS SECURITY POLICY
We may update this Security Policy from time to time to reflect new security measures, compliance requirements, or platform changes. Material updates will be communicated via:
- Posting the updated Policy on this page with a revised "Last Updated" date
- Email notification to users (if you have an account)
- Prominent notice on the Platform
We encourage you to review this Policy periodically to stay informed about how we protect your security.
13. CONTACT INFORMATION
For security-related questions, vulnerability reports, or abuse incidents, please contact us:
- Website: www.lynkb.ee
END OF SECURITY POLICY
Thank you for trusting Lynkbee. Together, we can maintain a safe and secure platform for everyone.