Blog : Security & Encryption

Practical notes on zero-knowledge encryption, client-side crypto, and building secure products. From the team behind Inkrypt—no fluff, just how we think about security and what we build.

Featured article

Featured4 min read

Zero-knowledge encryption: what it actually means when we can't see your data

We literally cannot read your notes. Here's what that implies for you and for us.

All articles

6 min read

AES vs RSA Encryption

AES vs RSA: how symmetric and asymmetric encryption differ, when to use each, and how they combine in real systems.

Read
5 min read

Client vs Server Encryption

Client-side vs server-side encryption: who holds the keys, who can read your data, and what a zero-knowledge architecture changes.

Read
5 min read

Data Breaches and Encryption

What actually happens in a data breach, and how strong encryption changes impact, notification, and recovery.

Read
5 min read

Encryption Policies for Companies

What a practical encryption policy should contain, from algorithms and key management to ownership and auditing responsibilities.

Read
8 min read

End-to-End Encryption for Teams

What end-to-end encryption for teams really means, how it differs from TLS, and where it fits in secure collaboration without marketing noise.

Read
7 min read

GDPR and Encryption Compliance

Is encryption required by GDPR, and what does compliant encryption actually look like in practice for SaaS and internal systems?

Read
5 min read

HIPAA and PCI Encryption Requirements

How HIPAA and PCI-DSS treat encryption, what is actually required, and where zero-knowledge and client-side encryption fit.

Read
6 min read

Inkrypt vs Other Encrypted Note Apps

How Inkrypt compares to other encrypted note apps, from architecture to threat models, without marketing gloss.

Read
5 min read

Key Management Best Practices

How to manage encryption keys safely across their lifecycle, from generation and storage to rotation and destruction.

Read
6 min read

Mobile Encryption and Smartphone Security

Is your phone actually encrypted, and what does that mean for secure notes, stolen devices, and zero-knowledge apps like Inkrypt?

Read
6 min read

Multi-Factor Authentication Explained

Why multi-factor authentication matters, how it works under the hood, and how it interacts with encrypted, zero-knowledge systems.

Read
9 min read

Password Manager vs Encrypted Notes

When should you use a password manager and when does a zero-knowledge encrypted note app make more sense? A technical comparison without fluff.

Read
9 min read

Secure Self-Destructing Messages Explained

Learn how secure self-destructing messages work with real client-side encryption, AES-256-GCM, and zero-knowledge design—beyond marketing claims.

Read
3 min read

Building trust in a zero-knowledge app: what to look for

You can’t verify our code from the app alone. Here’s what we do (and what to look for in any zero-knowledge product).

Read
3 min read

Why your note URL isn't a secret (and what actually is)

The link to your note is guessable. The password is what keeps it private. Here’s how to think about it.

Read
3 min read

Opening the same note on multiple devices without sync hell

No account means no “sync.” So how do you use the same note from your phone and laptop?

Read
3 min read

When to use a shared note vs separate encrypted notes

One note with one password shared with the team, or one note per person? It depends what you’re trying to protect.

Read
2 min read

Threat model basics: who can't read your note (and who could)

Zero-knowledge protects you from us and from server compromise. It doesn’t protect you from everything.

Read
4 min read

AES-256-GCM in the browser: a quick tour of our crypto stack

We use the Web Crypto API with AES-GCM. Here’s what that means and why we chose it.

Read
3 min read

PBKDF2 and why we use 310,000 iterations

Slowing down key derivation protects you from brute force. Here’s how we picked the number.

Read
3 min read

What we store on the server (and what we never see)

A transparent look at the exact fields we persist and why we never see your plaintext.

Read
3 min read

Choosing a password for encrypted notes: length vs complexity

For AES-256, the weak point isn’t the algorithm—it’s your password. Here’s how we think about it.

Read
3 min read

No password recovery isn't a bug—here's why we can't help if you forget

If you lose the password, the note is gone. That’s not a design oversight; it’s the only way zero-knowledge can work.

Read
3 min read

How we built an encrypted notepad and how it compares

We wanted something like ProtectedText but with a stack we could maintain and a UX we could improve. Here’s where we landed.

Read
3 min read

Why we encrypt in the browser (and what happens to your password)

Client-side encryption isn’t just a feature—it’s the only way we can promise we never see your data.

Read
3 min read

Sharing encrypted notes without leaking the key: what we learned

Sharing a note means sharing the link and the password. Sounds simple until you think about how that password travels.

Read

Ready to write secure notes?

No signup, no tracking. Encrypt in your browser and share with a link and password.

Create a note