CryptoNotes Logo CryptoNotes
← Back to Home

Security Architecture

A deep dive into how CryptoNotes protects your privacy with 100% mathematical certainty.

01

E2E Encryption

Encryption happens entirely inside your browser. Before any message is sent to our servers, it is processed through the AES-GCM 256-bit algorithm via the standard Web Crypto API.

Local Processing

Your raw text is never available in RAM outside of your own device's controlled environment.

Military Grade

AES-GCM is the industry standard for secure, authenticated data encryption.

02

Zero Knowledge

The decryption key is generated randomly on your device and appended to the URL as a hash fragment (everything after the #).

Technical Fact: Browsers never send the hash fragment to the server.

Because we never receive the key, we have Zero Knowledge of your content. If a government or hacker compromised our database, they would only see a wall of encrypted "blobs" that are impossible to crack without your unique URL.

03

Open Source Transparency

Trust should be verified, not assumed. Every line of code running on this platform is open for public audit.

  • Frontend Transparency Inspect the exact encryption logic in your browser console at any time.
  • Independent Hosting The system is designed to be easily deployable on your own infrastructure.