Encryption in transit

Last updated: Mar 16, 2026


All our applications and services have industry-standard encryption in transit.

Evidence of TLSv1.3 usage by Fluid Attacks
SSL configuration (retrieved from [SSL Labs](https://www.ssllabs.com))
  • Digital certificates for Fluid Attacks are renewed every 30 days in order to minimize leaks.
  • We use the HSTS policy to ensure that every connection to our domain goes through HTTPS.
  • We demand all connections to support at least TLSv1.2.
  • Our platform's database uses TLSv1.2 for the protection of data in transit.
  • We possess fully dedicated network channels with some of our biggest clients, allowing us to isolate all unwanted traffic. This is particularly useful for running secure dynamic application hacking.
  • For the rest of our clients, we use fully encrypted VPNs.
  • We maintain an SSL A+ score from SSL Labs. An updated report can be found in Fluid Attacks' profile.
Evidence of SSL Labs score of Fluid Attacks
SSL report (retrieved from [SSL Labs](https://www.ssllabs.com))

Requirements

Other confidentiality measures

On this page