Our Security & Safety Commitment
At Leora, safety and security aren't features—they're the foundation of everything we do. We understand that you're trusting us with your personal safety, your identity, and your search for genuine connection. We take that responsibility seriously. Our multi-layered approach combines rigorous identity verification, behavioral monitoring, and advanced security practices to create a dating platform where you can be vulnerable without being at risk.
Identity Verification
Every member must complete our comprehensive verification process before accessing the platform:
- Government ID Verification: Photo ID verification with liveness detection to prevent fake IDs and photos
- Phone Number Verification: Multi-factor authentication via phone to prevent fake accounts
- Biometric Verification: Facial recognition to ensure the person matches their ID
- Background Checks: Optional enhanced verification for added trust
- Social Validation: Optional linking of verified social media profiles
Verification badges are prominently displayed on profiles so you always know who you're talking to.
Behavioral Monitoring & Safety
Our advanced AI systems continuously monitor for patterns associated with predatory behavior:
- Pattern Recognition: Detecting love bombing, aggressive messaging, and manipulation tactics
- Red Flag Detection: Identifying requests for money, off-platform communication, or suspicious behavior
- Conversation Analysis: Monitoring for harassment, hate speech, and threatening language
- Profile Authenticity: Detecting fake profiles, catfishing, and impersonation attempts
- Proactive Intervention: Automatic warnings and blocks before harm occurs
Data Encryption
End-to-End Encryption
All messages between members are protected with end-to-end encryption, ensuring that only you and your match can read your conversations. Not even Leora can access the content of your encrypted messages.
Encryption in Transit
All data transmitted to and from Leora is encrypted using industry-standard TLS 1.3 protocols. This ensures that your data cannot be intercepted or read during transmission.
Encryption at Rest
All data stored on our systems is encrypted using AES-256 encryption. This includes your profile data, photos, verification documents, and all other personal information.
Infrastructure Security
- Cloud Infrastructure: We use industry-leading cloud providers with SOC 2 Type II certification
- Network Isolation: Multi-layer network segmentation and firewall protection
- DDoS Protection: Advanced distributed denial-of-service attack mitigation
- Intrusion Detection: Real-time monitoring and alerting for suspicious activities
- Regular Backups: Automated, encrypted backups with geographic redundancy
Access Controls
Authentication
- Multi-factor authentication (MFA) available for all accounts
- Strong password requirements enforced
- Session management and automatic timeout
- Single sign-on (SSO) support for enterprise customers
Authorization
- Role-based access control (RBAC) for team accounts
- Principle of least privilege enforced
- Audit logs for all access and changes
- Granular permissions for different features and data
Application Security
- Secure Development: Security-first development lifecycle and code review processes
- Vulnerability Scanning: Automated and manual security testing
- Penetration Testing: Regular third-party security assessments
- Dependency Management: Continuous monitoring and updating of software dependencies
- Input Validation: Protection against injection attacks and malicious input
Zero-Tolerance Enforcement
We have a zero-tolerance policy for predatory behavior, harassment, and violations of our Community Guidelines:
- Immediate Removal: Violations result in instant account termination
- Permanent Bans: Banned members cannot create new accounts
- Safety Network: Information about bad actors is shared across our network
- Law Enforcement Cooperation: We work with authorities on criminal activity
- Transparent Reporting: Easy-to-use reporting tools with rapid response
Member Safety Tools
We provide you with tools to stay safe while dating:
- Block & Report: Instantly block and report concerning behavior
- Privacy Controls: Control who can see your profile and contact you
- Video Verification: Request live video verification from matches
- Safety Center: Access to dating safety resources and tips
- Emergency Contacts: Share date details with trusted contacts
- Location Sharing: Optional real-time location sharing during dates
Compliance and Certifications
We maintain compliance with industry standards and regulations, including:
- GDPR (General Data Protection Regulation)
- CCPA (California Consumer Privacy Act)
- SOC 2 Type II (in progress)
- ISO 27001 (planned)
Employee Security
- Background checks for all employees
- Regular security awareness training
- Strict access controls and monitoring
- Confidentiality and data protection agreements
- Immediate access revocation upon employee departure
Incident Response
We maintain a comprehensive incident response plan that includes:
- 24/7 security monitoring and alerting
- Defined escalation procedures
- Rapid response team for security incidents
- Transparent communication with affected customers
- Post-incident analysis and improvement process
Business Continuity
- High availability architecture with 99.9% uptime SLA
- Geographic redundancy for critical systems
- Disaster recovery procedures tested regularly
- Automated failover mechanisms
- Regular backup testing and validation
API Security
For customers using our SDK or API:
- API keys and token-based authentication
- Rate limiting to prevent abuse
- Request signing and validation
- API activity logging and monitoring
- Webhook signature verification
Third-Party Security
We carefully vet all third-party services and vendors:
- Security assessments before integration
- Contractual data protection obligations
- Regular vendor security reviews
- Minimal data sharing principle
- Subprocessor transparency and notification
Safety Best Practices for Members
To help keep yourself safe while dating, we recommend:
- Enable multi-factor authentication (MFA)
- Use strong, unique passwords
- Never share financial information or send money to matches
- Meet in public places for initial dates
- Tell friends or family about your date plans
- Trust your instincts—if something feels off, report it
- Keep conversations on-platform until you've met in person
- Report any suspicious behavior or policy violations
- Use our video verification feature before meeting
Reporting Safety Concerns
Your safety is our top priority. If you encounter concerning behavior or feel unsafe:
- In-App Reporting: Use the report button on any profile or conversation
- Safety Team: Contact our 24/7 safety team for urgent concerns
- Emergency: If you're in immediate danger, contact local emergency services first
We review all reports within 2 hours and take immediate action when safety is at risk.
Reporting Security Issues
We value the security research community and welcome responsible disclosure of security vulnerabilities. If you discover a security issue, please report it to:
Email: security@leora.uk
We commit to:
- Respond within 24 hours
- Keep you informed of our progress
- Credit researchers who report valid issues (with permission)
- Not take legal action against responsible disclosure
Questions About Security or Safety?
For security or safety-related questions, please contact:
Email: security@leora.uk