Security-first
Account protection
Traffic quality
Security & traffic quality
We design 1LinkAD with a security-first approach: protect accounts, data, and infrastructure while reducing low-quality traffic risks.
Last updated: 2026-02-11 • Report an issue: security@1linkad.com
Quick overview
Account protection
Hashed passwords, secure sessions, recommended 2FA (if enabled).
Data protection
Access controls, least-privilege permissions, logging and backups.
Abuse prevention
Rate limiting, bot/scan detection, and abuse risk reduction.
Traffic quality
Technical signals to help you control traffic quality better.
1) Account security
- Passwords are stored as hashes (never plain text).
- Use strong passwords and avoid reusing them across services.
- Failed-login limits and brute-force prevention (depending on config).
- Secure sessions/cookies to reduce account takeover risks.
2) Click/analytics data protection
- We collect only what is necessary to operate tracking and optimize campaigns.
- Internal access follows a least-privilege principle.
- Regular backups and recovery procedures.
- Optional IP masking / reduced IP granularity if supported.
3) Infrastructure security
- Monitoring, anomaly alerts, and regular security updates.
- Restricted admin access and environment separation where applicable.
- Protection against scanning, spam, and overload attempts.
4) Traffic quality & abuse prevention
- Detect automated traffic (bot/scan) to reduce campaign impact.
- Rate limiting to curb spam clicks and anomalies.
- Analyze device/country/referrer to spot low-quality sources.
- Use UTM + reconcile with GA4/Pixel for conversion truth.
5) Retention & data lifecycle
Click/log retention may vary by plan and system settings. We aim to retain only what’s necessary for service delivery and security.
6) Incident response
- Receive reports and verify issues.
- Contain impact and mitigate quickly.
- Fix and perform post-incident review.
- Notify users where appropriate (if needed).
7) What you can do to stay safe
- Use strong passwords and enable 2FA if available.
- Do not share accounts or private tokens.
- Point domains/DNS following the Docs.
- Monitor dashboards to detect anomalies early.
FAQ
It depends on configuration and the need for abuse prevention/measurement. If IP masking is supported, you can reduce IP granularity.
Review sources/referrers, device, country, and apply rules/rate limits. Contact support for optimization help.
Email the security contact below with details and evidence (if any).