Blog : Security & Encryption
Practical notes on zero-knowledge encryption, client-side crypto, and building secure products. From the team behind Inkrypt—no fluff, just how we think about security and what we build.
Featured article
Zero-knowledge encryption: what it actually means when we can't see your data
We literally cannot read your notes. Here's what that implies for you and for us.
All articles
AES vs RSA Encryption
AES vs RSA: how symmetric and asymmetric encryption differ, when to use each, and how they combine in real systems.
Client vs Server Encryption
Client-side vs server-side encryption: who holds the keys, who can read your data, and what a zero-knowledge architecture changes.
Data Breaches and Encryption
What actually happens in a data breach, and how strong encryption changes impact, notification, and recovery.
Encryption Policies for Companies
What a practical encryption policy should contain, from algorithms and key management to ownership and auditing responsibilities.
End-to-End Encryption for Teams
What end-to-end encryption for teams really means, how it differs from TLS, and where it fits in secure collaboration without marketing noise.
GDPR and Encryption Compliance
Is encryption required by GDPR, and what does compliant encryption actually look like in practice for SaaS and internal systems?
HIPAA and PCI Encryption Requirements
How HIPAA and PCI-DSS treat encryption, what is actually required, and where zero-knowledge and client-side encryption fit.
Inkrypt vs Other Encrypted Note Apps
How Inkrypt compares to other encrypted note apps, from architecture to threat models, without marketing gloss.
Key Management Best Practices
How to manage encryption keys safely across their lifecycle, from generation and storage to rotation and destruction.
Mobile Encryption and Smartphone Security
Is your phone actually encrypted, and what does that mean for secure notes, stolen devices, and zero-knowledge apps like Inkrypt?
Multi-Factor Authentication Explained
Why multi-factor authentication matters, how it works under the hood, and how it interacts with encrypted, zero-knowledge systems.
Password Manager vs Encrypted Notes
When should you use a password manager and when does a zero-knowledge encrypted note app make more sense? A technical comparison without fluff.
Secure Self-Destructing Messages Explained
Learn how secure self-destructing messages work with real client-side encryption, AES-256-GCM, and zero-knowledge design—beyond marketing claims.
Building trust in a zero-knowledge app: what to look for
You can’t verify our code from the app alone. Here’s what we do (and what to look for in any zero-knowledge product).
Why your note URL isn't a secret (and what actually is)
The link to your note is guessable. The password is what keeps it private. Here’s how to think about it.
Opening the same note on multiple devices without sync hell
No account means no “sync.” So how do you use the same note from your phone and laptop?
When to use a shared note vs separate encrypted notes
One note with one password shared with the team, or one note per person? It depends what you’re trying to protect.
Threat model basics: who can't read your note (and who could)
Zero-knowledge protects you from us and from server compromise. It doesn’t protect you from everything.
AES-256-GCM in the browser: a quick tour of our crypto stack
We use the Web Crypto API with AES-GCM. Here’s what that means and why we chose it.
PBKDF2 and why we use 310,000 iterations
Slowing down key derivation protects you from brute force. Here’s how we picked the number.
What we store on the server (and what we never see)
A transparent look at the exact fields we persist and why we never see your plaintext.
Choosing a password for encrypted notes: length vs complexity
For AES-256, the weak point isn’t the algorithm—it’s your password. Here’s how we think about it.
No password recovery isn't a bug—here's why we can't help if you forget
If you lose the password, the note is gone. That’s not a design oversight; it’s the only way zero-knowledge can work.
How we built an encrypted notepad and how it compares
We wanted something like ProtectedText but with a stack we could maintain and a UX we could improve. Here’s where we landed.
Why we encrypt in the browser (and what happens to your password)
Client-side encryption isn’t just a feature—it’s the only way we can promise we never see your data.
Sharing encrypted notes without leaking the key: what we learned
Sharing a note means sharing the link and the password. Sounds simple until you think about how that password travels.
Ready to write secure notes?
No signup, no tracking. Encrypt in your browser and share with a link and password.
Create a note