We use multiple security layers to protect donors and charities:

  • IP Risk Assessment: Flag anonymized IPs (VPN, proxy, hosting, Tor)
  • Behavioral Analysis: Detect suspicious patterns (too rapid attempts, automated behavior)
  • Card Testing Protection: Limits on repeated failed payments and excessive card attempts
  • Rate Limiting: Time-based restrictions per IP address and session
  • CAPTCHA: Displayed to suspicious users to prevent bots
  • CSRF Protection: Validate all form submissions with secure tokens
  • Input Validation: Strict data sanitization and validation to prevent XSS and injection attacks
  • Local IP Lookups: All checks processed on-server; minimal third-party data sharing

Note: All security checks are processed locally on our servers using monthly-updated databases. No real-time third-party requests are made.