The First Question: “Is Splync Safe?”
When Splync reached its MVP release, some of my friends tested the app in real life. They signed up with their email and password, created projects, and added expenses. Everything worked quite well, aside from a few minor bugs. But the very first question they asked wasn’t about design, features, or speed. It was about security. Could they really trust Splync with their daily expense records? That’s a fair and important question. Personal finance data is highly sensitive, and any app that handles it must be secure.
Splync Uses HTTPS, Not HTTP
Splync needs the Internet to let users link data, share projects, and keep expenses synchronized across devices. That means every number you record and every button you tap travels through the web before reaching the server. Without protection, anyone sitting on the same Wi-Fi network could silently watch that traffic go by. This is why Splync uses HTTPS, not HTTP.
Why HTTP Is Not Secure
HTTP (Hypertext Transfer Protocol) was once the standard way to communicate over the Internet. But it has a serious flaw: it sends information in plain text. Imagine writing your secrets on a postcard instead of sealing them in an envelope. Anyone who handles the mail — the post office staff, the courier, even a stranger peeking through a window — could read every word. That’s what the old “http” connection was like in the early days of the web. It worked, but it wasn’t private.HTTPS fixes this by sealing your message inside an encrypted envelope that only you and the official server can open.
How HTTPS Protects You
When you open Splync, your smartphone and our server start talking—but they don’t trust each other right away. First, they perform a small ritual called a handshake. It’s like two strangers exchanging ID cards before sharing secrets. In that handshake, your phone checks the server’s digital certificate, which proves that it really is Splync and not an impostor pretending to be us. Once trust is established, both sides agree on a temporary secret key—a kind of password used only for this session.
Handshake Starts Secured Communication
From that moment, everything you send—your login, your project data, your expenses—is scrambled using that key. If someone tried to intercept the signal, they’d see nothing but random characters, like trying to read a conversation shouted underwater. This all happens automatically, in milliseconds, every time you open the app. You never see it, but HTTPS is constantly standing guard, making sure your private data remains just that—private. That’s why we call it the invisible shield: it works silently in the background, but without it, the Internet would still be an open postcard world.
What If an App Doesn’t Use HTTPS
To understand why HTTPS matters, imagine a simple scene. You’re at a café, enjoying coffee while checking your expenses on a public Wi-Fi network. Without HTTPS, every tap you make—your email, your password, even private project names—travels through the air in plain text. Anyone nearby with basic tools could intercept that connection and read everything, line by line. It’s called a man-in-the-middle attack, and in the early days of the Internet, it was alarmingly common because most websites didn’t encrypt their traffic at all.
How to Tell If a Site Is Secure
Today, browsers actively warn users when a site isn’t protected by HTTPS. If you ever see a web address starting with "http://", avoid entering any sensitive information—it means the connection isn’t encrypted. Always check that the URL begins with "https://" and that a small lock icon appears next to it. That little "S" in HTTPS stands for Secure, and it makes all the difference. It tells you that your data travels safely inside an encrypted tunnel, not on an open postcard.
Can You Check the URL in an App?
You might wonder how to check a URL of an app, which is usually invisible. Modern apps are designed to communicate only through secure HTTPS requests. Developers specify the exact server address inside the app’s source code, and the system automatically blocks any unsafe "http://" connections. For example, on iPhone, every app must use HTTPS by default. Apple enforces this through a framework called App Transport Security (ATS), which rejects any unencrypted communication unless the developer explicitly requests an exception.
Splync Is Safe With HTTPS
Your smartphone itself acts as the guard, refusing any connection that isn’t encrypted. So even though you never see the URL, every time Splync connects to our server, it’s already traveling through that same invisible shield of HTTPS. HTTPS protects the road between your device and our server. But what about the server itself? That’s where our next topic, SSH, comes in.