Uncompromising Security for Your Digital Legacy

At Cryonote, we've implemented cutting-edge cryptographic protocols to ensure your digital legacy remains private, secure, and accessible only to those you choose.

1. Introduction

Security is at the core of everything we do at Cryonote. We understand the importance of protecting your most sensitive information and have designed our platform with multiple layers of security to ensure your data remains confidential and secure.

2. Security Architecture

Our security architecture is built upon industry-leading standards and best practices. Below are some key components of our security framework:

Client-Side Encryption

All sensitive data is encrypted on your device using AES-256 before transmission, ensuring end-to-end encryption.

Zero-Knowledge Architecture

Your encryption keys never leave your device. Our servers only store encrypted data, making it impossible for us to access your information.

Advanced Key Derivation

We use PBKDF2 with 100,000 iterations and SHA-256 for key derivation, protecting against brute-force attacks.

Secure Data Storage

All data at rest is encrypted using AES-256 in GCM mode, with unique keys for each piece of data, ensuring multiple layers of protection.

Granular Access Controls

Define precise access rules for your digital legacy, specifying which trusted contacts can access what information and under what circumstances.

Continuous Security Monitoring

We employ advanced intrusion detection systems and conduct regular security audits to maintain the highest level of protection.

Encrypted File Attachments

We also encrypt all file attachments with the same encryption method you choose for your messages, ensuring that your files are protected both in transit and at rest.

3. Security Levels

Standard Security

Robust protection for non-sensitive information. In Standard Security mode, files and message content are encrypted server-side. Please note that Standard Security does not offer zero-knowledge encryption; our servers handle the encryption process.

  • Server-side AES-256 encryption
  • Secure file storage with server-side encryption
  • TLS 1.3 for data in transit
  • Two-factor authentication
  • Regular security audits

Enhanced Security

Maximum privacy with local encryption for sensitive data. In Enhanced Security mode, we employ zero-knowledge encryption; files and message content are encrypted on your device, and we never have access to your unencrypted data.

  • Client-side AES-256 encryption
  • Zero-knowledge architecture
  • End-to-end encryption for all data, including file attachments
  • Local key generation and management
  • Advanced access controls
  • Optional hardware security module integration

4. Our Commitment to Security

Security is ingrained in every aspect of our operations:

  • Regular third-party security audits and penetration testing
  • Continuous monitoring and rapid response to emerging threats
  • Strict adherence to industry best practices and standards (NIST, ISO 27001)
  • Ongoing employee security training and background checks
  • Transparent bug bounty program to encourage responsible disclosure

5. Frequently Asked Questions

How does Cryonote protect my data?

We use end-to-end encryption, meaning your data is encrypted on your device before it's sent to our servers. With Enhanced Security, we never have access to your unencrypted data or encryption keys. All file attachments are also encrypted to ensure complete protection.

What's the difference between Standard and Enhanced Security?

Standard Security provides robust protection with server-side encryption but does not offer zero-knowledge encryption. Files and message content are encrypted on our servers. Enhanced Security offers maximum privacy with client-side encryption and a zero-knowledge architecture, meaning we have no access to your unencrypted data.

How does Cryonote handle government requests for data?

We comply with valid legal requests, but due to our zero-knowledge architecture with Enhanced Security, we can only provide encrypted data. We cannot decrypt your data or provide your encryption keys.

6. Canary Notice

As of 4/17/2025, Cryonote has never received a National Security Letter, an order under the Foreign Intelligence Surveillance Act, or any other classified request for user information.

If we ever receive such a request, we will update this notice to remove this statement. The absence of this statement in future versions of this page should be interpreted as an indication that we have received such a request.

7. Ready to Secure Your Legacy?

Join Cryonote today and experience unparalleled protection for your digital legacy.

Get Started