Encryption of Tokens and Sensitive Data
Access token, oauth tokens and other sensitive information is encrypted and stored. At no point they are transmitted or logged as plain-text. Lastly, there are multiple encryption keys layered on top of each other and stored in distributed system, so that there is no single point of failure to get access to these tokens.