Security at Our Platform

We designed the platform with end-to-end encryption (E2EE). This means only you control your secrets.

How It Works

End-to-End Encryption

Your master key is never sent to our servers. All encryption and decryption happen locally on your device, ensuring only you control your secrets.

Recovery Phrase Protection

Your master key is protected by a recovery phrase, similar to cryptocurrency wallets. This allows you to restore access if all devices are lost.

Device Security

New devices must be approved using your recovery phrase or an existing trusted device. Each device has its own cryptographic keys for authentication.

Why This Matters

🔒

We Cannot Read Your Secrets

Our servers only ever see encrypted data, salts, and non-sensitive metadata. Your actual secrets remain completely private.

🔑

We Cannot Reset Your Recovery Phrase

Your recovery phrase is the only way to restore access. Without it, no one, including us and you, can recover your data.

🔐

You Control Device Trust

Only you decide which devices are trusted. We support push notifications for secure device approval.

🛡️

Strong Cryptography Protection

Advanced cryptographic algorithms protect against brute-force attacks and data leaks, ensuring your data remains secure.

Technical Security Details

Device Security

  • New devices require approval via recovery phrase or trusted device
  • Each device has unique cryptographic keys for authentication
  • WebAuthn and push notifications for secure device approval

Recovery Process

  • Recovery phrase allows device key regeneration
  • Phrase unlocks your master key for data access
  • Without the phrase, data recovery is impossible