Security Architecture
A deep dive into how CryptoNotes protects your privacy with 100% mathematical certainty.
E2E Encryption
Encryption happens entirely inside your browser. Before any message is sent to our servers, it is processed through the AES-GCM 256-bit algorithm via the standard Web Crypto API.
Local Processing
Your raw text is never available in RAM outside of your own device's controlled environment.
Military Grade
AES-GCM is the industry standard for secure, authenticated data encryption.
Zero Knowledge
The decryption key is generated randomly on your device and
appended to the URL as a hash fragment (everything after the #).
Technical Fact: Browsers never send the hash fragment to the server.
Because we never receive the key, we have Zero Knowledge of your content. If a government or hacker compromised our database, they would only see a wall of encrypted "blobs" that are impossible to crack without your unique URL.
Open Source Transparency
Trust should be verified, not assumed. Every line of code running on this platform is open for public audit.
- ● Frontend Transparency Inspect the exact encryption logic in your browser console at any time.
- ● Independent Hosting The system is designed to be easily deployable on your own infrastructure.