Skip to main content

Security at ConvertIntoMP4

Your files are encrypted in transit, processed in isolation, scanned for malware, and permanently deleted within 2 hours. No human ever sees your data.

2M+

Files Converted

268

Formats Supported

13

Open-Source Engines

2h

Auto-Delete

How We Handle Your Files

Every file follows the same secure pipeline. No exceptions.

Upload

256-bit TLS encryption

Scan

ClamAV virus check

Convert

Isolated process, no file mixing

Deliver

HMAC-signed download URL

Auto-Delete

Wiped within 2 hours

File Handling

We treat every file as sensitive by default. Our file lifecycle is designed so that nothing persists longer than absolutely necessary:

  • Input files are deleted from our servers immediately after conversion completes
  • Output files are stored temporarily on Cloudflare R2 and automatically purged within 2 hours
  • Users can manually delete converted files at any time before the 2-hour window expires
  • No backups of user files are ever created — deletion is permanent and irreversible
  • Conversion metadata (job ID, format, status) is stored in Redis with a 24-hour TTL and then purged

Encryption

All data in transit between your browser and our servers is encrypted using industry-standard protocols:

  • 256-bit TLS/SSL encryption on every connection — uploads, downloads, API calls, and webhooks
  • HSTS (HTTP Strict Transport Security) enabled with a 2-year max-age and preload directive — browsers are forced to use HTTPS
  • TLS 1.3 supported via Cloudflare for the fastest, most secure handshake
  • Download links use HMAC-signed URLs with expiration timestamps — they cannot be guessed or reused

Data Isolation

Every conversion runs in its own isolated process to prevent cross-contamination between users:

  • Each conversion job runs as an isolated process with its own temporary directory
  • Files are bound to the user's session — no other user or process can access them
  • LibreOffice instances run with unique UserInstallation paths to prevent state leakage between concurrent conversions
  • Temporary files are cleaned by a disk janitor process that removes orphaned files every 5-30 minutes

Infrastructure

Our infrastructure is hosted entirely in the European Union with enterprise-grade providers:

  • Hetzner Cloud dedicated server in Helsinki, Finland (EU) — your data never leaves EU jurisdiction during processing
  • Cloudflare CDN provides global edge caching, DDoS protection, and WAF (Web Application Firewall) rules
  • Cloudflare R2 object storage for temporary file storage — no egress fees, EU-compliant
  • PostgreSQL database and Redis cache run on the same Hetzner server — no cross-network data transfer
  • Docker containerized deployment with health checks on all services

Compliance

ConvertIntoMP4 is built with privacy-by-design principles and complies with major data protection regulations:

  • GDPR compliant — we process the minimum data necessary, honor all data subject rights, and provide full transparency
  • Data Processing Agreement (DPA) available for business customers upon request
  • Privacy by design — files are auto-deleted, no human reviews content, no data is used for training
  • Maximum 2-hour retention for all user files — no long-term storage of conversion data
  • CCPA compliant — California residents can request data access and deletion
  • See our GDPR, Privacy Policy, and DPA pages for full details

Authentication Security

If you create an account, we protect it with multiple layers of security:

  • Two-factor authentication (2FA) via TOTP — compatible with Google Authenticator, Authy, and other authenticator apps
  • Passwords hashed with bcrypt — we never store plaintext passwords
  • Session management with secure, HttpOnly cookies and CSRF double-submit protection
  • OAuth sign-in via Google and GitHub — no password needed, tokens stored server-side only
  • Login attempt rate limiting and suspicious activity detection

API Security

Our REST API is protected with multiple security layers for developers and integrations:

  • API key authentication with hashed storage — keys are shown once at creation and never stored in plaintext
  • HMAC-signed webhooks — every webhook delivery includes a cryptographic signature you can verify
  • Rate limiting — 60 requests per minute per API key with X-RateLimit-* headers
  • CORS protection — cross-origin requests restricted to authorized domains
  • Input validation via Zod schemas on every endpoint — malformed requests are rejected before processing

Virus Scanning

Every uploaded file is scanned for malware before conversion begins:

  • ClamAV antivirus scans all uploads in real time before they enter the conversion pipeline
  • Infected files are immediately rejected and deleted — they are never processed or stored
  • Virus definitions are updated automatically to protect against the latest threats
  • ZIP bomb detection prevents decompression attacks from overloading the system

Open-Source Engines

All 13 of our conversion engines are open-source software, publicly auditable, and trusted by millions:

  • FFmpeg — video and audio conversion
  • Sharp (libvips) — high-performance image processing
  • ImageMagick — image format fallback
  • LibreOffice — document conversion (PDF, DOCX, XLSX, PPTX)
  • Pandoc — markdown and markup conversion
  • Calibre — ebook format conversion
  • Ghostscript — PDF compression and processing
  • pdf-lib — PDF operations (merge, split, rotate)
  • vtracer & potrace — image-to-SVG vectorization
  • Puppeteer — website-to-PDF/PNG capture
  • fonttools — font format conversion
  • 7-Zip — archive compression and extraction

No proprietary, closed-source, or third-party conversion APIs are used. Your files never leave our server during processing.

Questions?

If you have security concerns or want to report a vulnerability, contact us at [email protected]. We take every report seriously and will respond within 48 hours.