VDO is built for people who work with unreleased content. Security isn't a premium add-on — it's how the platform works from the ground up.
In Colour Rooms, your video stream goes directly from your machine to your collaborator's. It never passes through our servers. We can't see it, we can't record it, we can't access it — because it never touches our infrastructure.
The connection is encrypted end-to-end. Even if someone were to intercept the network traffic, they'd see nothing but encrypted data. The decryption keys exist only on your machine and your collaborator's.
Direct peer-to-peer connection
End-to-end encrypted — no server-side decryption
Relay fallback only when NAT traversal fails, still encrypted
Editorial Rooms stream through our regional servers to reach multiple viewers simultaneously. The stream is encrypted in transit between your machine and the server, and again between the server and each viewer.
Our servers process the stream to deliver it to multiple viewers efficiently, but we don't store your video content. Once the session ends, the stream data is gone. There are no recordings unless you explicitly enable them.
Encrypted in transit to and from regional servers
No persistent storage of stream data
Servers in controlled infrastructure with restricted access
Streams are transient. Once a session ends, the video data is gone. We don’t keep copies, don’t build a library of your work, and don’t have access to what you streamed.
Every room can be password-protected. You control who has access through your team settings. Viewers need the link and, if you set one, the password.
Every stream on VDO is encrypted. This isn’t a setting you need to enable or a feature on a higher tier. It’s the default on every plan, every room, every session.
Security is only useful if you can control it. Every room gives you straightforward tools to manage who can see your content and how.
Set a password on any room
Control who can create and manage rooms
Invite-only or open link sharing
End sessions and revoke access instantly
We run our own servers on dedicated hardware — not shared cloud VMs. Our regional servers are in professionally managed data centres with physical security, redundant power, and restricted access. We control the entire stack from network to application.
The API and authentication layer use industry-standard practices: hashed passwords, secure token-based sessions, and HTTPS everywhere. We don't cut corners on the boring infrastructure stuff because that's where most breaches happen.