GL · Security best practices

Secure Document Signing Online

Document security isn't just a feature — it's the foundation of any trustworthy e-signature platform. When you sign a document electronically, you need confidence that the document can't be tampered with, that your identity is protected, and that there's an unbreakable chain of evidence proving what was signed, when, and by whom.

Security best practices

Global · Enacted Ongoing

Key Provisions

TLS/HTTPS encryption protects all data in transit between browser and server

SHA-256 document hashing creates a unique fingerprint at upload and after signing

ECDSA P-256 cryptographic signatures provide mathematical non-repudiation

Append-only audit trail cannot be modified or deleted by any user or system process

32-byte cryptographically random signing tokens — only hashes stored in database

Infrastructure includes biometric access, 24/7 surveillance, and redundant power

Document security isn't just a feature — it's the foundation of any trustworthy e-signature platform. When you sign a document electronically, you need confidence that the document can't be tampered with, that your identity is protected, and that there's an unbreakable chain of evidence proving what was signed, when, and by whom. SignForge implements defense-in-depth security: TLS encryption protects data in transit, documents are hashed with SHA-256 at every stage, ECDSA P-256 cryptographic signatures provide mathematical proof of document authenticity, and an append-only audit trail ensures no event can ever be modified or deleted. Signing tokens are 32 bytes of cryptographic randomness, and only their SHA-256 hashes are stored in the database. Our infrastructure runs on Hetzner in Germany, with ISO 27001:2022 certified data centers featuring biometric access control, 24/7 surveillance, and redundant power systems.

Compliance Verified

How SignForge meets Security best practices requirements

TLS 1.3 encryption on all connections via Cloudflare edge network

SHA-256 hash computed at document upload and recomputed after PDF stamping

ECDSA P-256 digital signatures embedded in verification records

QR code on every signed document links to public verification endpoint

Signing tokens: 32 bytes crypto-random, base64url encoded, only SHA-256 hash stored

Security headers: CSP, HSTS, X-Frame-Options, X-Content-Type-Options enforced

256-bit Encryption

TLS 1.3 + SHA-256

ECDSA P-256

Cryptographic proof

Audit Trail

Append-only, immutable

ISO 27001

Certified infrastructure

Frequently asked questions

How does SignForge keep my documents secure?

SignForge uses multiple layers of security: TLS encryption for data in transit, SHA-256 hashing for document integrity, ECDSA P-256 cryptographic signatures for non-repudiation, and an immutable audit trail. Signing tokens are 32 bytes of cryptographic randomness, and only their hashes are stored.

Can a signed document on SignForge be tampered with?

Any tampering would be immediately detectable. SignForge computes a SHA-256 hash of the document at upload and after signing. Changing even a single byte would produce a completely different hash. Additionally, ECDSA cryptographic signatures embedded in the verification record would fail validation.

What encryption does SignForge use?

SignForge uses TLS 1.3 for data in transit, SHA-256 for document integrity hashing, ECDSA P-256 for cryptographic verification signatures, and bcrypt for password hashing. Signing tokens use 32 bytes of crypto-random data.

Ready to sign with confidence?

Legally binding e-signatures with 256-bit encryption, cryptographic verification, and an immutable audit trail. Free forever.

Get started free

No credit card required.