Uncompromising Security for Your Digital Legacy
At Cryonote, we've implemented cutting-edge cryptographic protocols to ensure your digital legacy remains private, secure, and accessible only to those you choose.
1. Introduction
Security is at the core of everything we do at Cryonote. We understand the importance of protecting your most sensitive information and have designed our platform with multiple layers of security to ensure your data remains confidential and secure.
2. Security Architecture
Our security architecture is built upon industry-leading standards and best practices. Below are some key components of our security framework:
Client-Side Encryption
All sensitive data is encrypted on your device using AES-256 before transmission, ensuring end-to-end encryption.
Zero-Knowledge Architecture
Your encryption keys never leave your device. Our servers only store encrypted data, making it impossible for us to access your information.
Advanced Key Derivation
We use PBKDF2 with 100,000 iterations and SHA-256 for key derivation, protecting against brute-force attacks.
Secure Data Storage
All data at rest is encrypted using AES-256 in GCM mode, with unique keys for each piece of data, ensuring multiple layers of protection.
Granular Access Controls
Define precise access rules for your digital legacy, specifying which trusted contacts can access what information and under what circumstances.
Continuous Security Monitoring
We employ advanced intrusion detection systems and conduct regular security audits to maintain the highest level of protection.
Encrypted File Attachments
We also encrypt all file attachments with the same encryption method you choose for your messages, ensuring that your files are protected both in transit and at rest.
3. Security Levels
Standard Security
Robust protection for non-sensitive information. In Standard Security mode, files and message content are encrypted server-side. Please note that Standard Security does not offer zero-knowledge encryption; our servers handle the encryption process.
- Server-side AES-256 encryption
- Secure file storage with server-side encryption
- TLS 1.3 for data in transit
- Two-factor authentication
- Regular security audits
Enhanced Security
Maximum privacy with local encryption for sensitive data. In Enhanced Security mode, we employ zero-knowledge encryption; files and message content are encrypted on your device, and we never have access to your unencrypted data.
- Client-side AES-256 encryption
- Zero-knowledge architecture
- End-to-end encryption for all data, including file attachments
- Local key generation and management
- Advanced access controls
- Optional hardware security module integration
4. Our Commitment to Security
Security is ingrained in every aspect of our operations:
- Regular third-party security audits and penetration testing
- Continuous monitoring and rapid response to emerging threats
- Strict adherence to industry best practices and standards (NIST, ISO 27001)
- Ongoing employee security training and background checks
- Transparent bug bounty program to encourage responsible disclosure
5. Frequently Asked Questions
How does Cryonote protect my data?
We use end-to-end encryption, meaning your data is encrypted on your device before it's sent to our servers. With Enhanced Security, we never have access to your unencrypted data or encryption keys. All file attachments are also encrypted to ensure complete protection.
What's the difference between Standard and Enhanced Security?
Standard Security provides robust protection with server-side encryption but does not offer zero-knowledge encryption. Files and message content are encrypted on our servers. Enhanced Security offers maximum privacy with client-side encryption and a zero-knowledge architecture, meaning we have no access to your unencrypted data.
How does Cryonote handle government requests for data?
We comply with valid legal requests, but due to our zero-knowledge architecture with Enhanced Security, we can only provide encrypted data. We cannot decrypt your data or provide your encryption keys.
6. Canary Notice
As of 4/17/2025, Cryonote has never received a National Security Letter, an order under the Foreign Intelligence Surveillance Act, or any other classified request for user information.
If we ever receive such a request, we will update this notice to remove this statement. The absence of this statement in future versions of this page should be interpreted as an indication that we have received such a request.
7. Ready to Secure Your Legacy?
Join Cryonote today and experience unparalleled protection for your digital legacy.
Get Started