Back to Home

🔒 Encryption Implementation Details

Technical details about the encryption methods used to protect your notes when you choose to encrypt them.

AES-256 Encryption

Important Notes

How The Encryption Works

When you create an encrypted note, your password is processed through PBKDF2 with 100,000 iterations to create a secure key. This key is then used with AES-256-GCM to encrypt your content. The encrypted data is stored on my servers, but I have no way to decrypt it without your password.

Data Protection

All data transmission is secured using HTTPS/TLS encryption. My servers are protected by standard security measures, and I regularly update security protocols to protect against emerging threats.

Your Control

You have complete control over your data. You can create, share, and manage your notes without any interference. I believe in transparency and will never compromise your privacy for any reason.