Payment Security

Your payments are processed by Stripe, the world's leading payment processor, and protected by our escrow system at every step.

Powered by Stripe

We use Stripe, trusted by millions of businesses worldwide, to process all payments securely.

No Card Data Stored

We never see, store, or have access to your credit card details. All card processing happens directly on Stripe's PCI-compliant servers.

PCI DSS Level 1 Certified

Stripe maintains the highest level of PCI DSS certification, ensuring your payment data meets the strictest security standards.

3D Secure Authentication

For added security, Stripe supports 3D Secure (3DS) authentication, adding an extra verification step for card payments.

Global Payment Methods

Pay with major credit cards, debit cards, and local payment methods. All transactions are encrypted with TLS 1.3.

How Your Money Is Protected

Our escrow system ensures your money is always safe throughout the entire transaction.

1

Payment Captured

When you purchase a listing, Stripe securely captures your payment. The funds are held — not sent to the seller.

2

Held in Escrow

Your money sits safely in Stripe's escrow while the seller completes the booking transfer to your name.

3

Transfer Confirmed

Once you confirm the booking is in your name, or 72 hours pass after the travel date, the funds are released.

4

Seller Paid Securely

The seller receives the payment minus the platform fee, transferred directly to their verified Stripe Connect account.

Fraud Prevention

Multiple layers of protection keep the marketplace safe for everyone.

AI-Powered Listing Review

Every listing is automatically analyzed by our AI moderation system to detect fraudulent, misleading, or suspicious content before it goes live.

Seller ID Verification

All sellers must verify their identity with a government-issued ID through Stripe Identity before their first listing can go active.

Rate Limiting & Abuse Prevention

Intelligent rate limiting on all payment and listing endpoints prevents automated attacks and abuse.

Idempotent Transactions

Every payment operation uses idempotency keys to prevent duplicate charges, even in the event of network issues.