How Blade protects your terminal sessions, data, and communications.
Multiplayer sessions use X25519 key exchange with AES-256-GCM encryption. Terminal content and chat messages are encrypted between participants - Blade servers cannot read session data.
All WebSocket connections use TLS 1.3 with self-signed certificates and fingerprint-based trust-on-first-use (TOFU) verification.
Blade runs entirely on your machine. Terminal data never leaves your computer unless you explicitly share a session. No telemetry, no cloud processing.
Built in Rust with zero unsafe code in core paths. No buffer overflows, use-after-free, or data races. The compiler guarantees memory safety at compile time.
If you discover a security vulnerability in Blade, please report it responsibly to security@bladeterm.com. We aim to respond within 48 hours and will credit researchers in our security advisories.