Skip to main content
Toggle navigation menu
Back to website
Sign in
Need help?
Quickly find answers to your questions.
Search
Support - Jifeline Networks
Technical & Security Information
Device & Network Security
Device & Network Security
What method is used to protect user credentials?
Could someone hack Jifeline and take control of a vehicle?
What methods are used to encrypt data at rest and in transit?
Is any sensitive data or personal information stored on the hardware?
Does Jifeline follow a secure software development lifecycle (SSDLC)?
Is there a secure boot process to prevent unauthorized firmware or operating systems from running?
We restrict outbound traffic on our firewall based on IP addresses. Can the Jifeline infrastructure work with this setup?
Is it possible for unauthorized users to gain access to the workshop or partners network through the Jifeline infrastructure?