1. Client-side cryptography
Messages are encrypted in the browser using Web Crypto (AES-GCM). The server stores ciphertext and metadata.
This page describes the current implementation: which data is encrypted client-side, how links and keys are handled, which access controls are active, and where the model limits are.
Messages are encrypted in the browser using Web Crypto (AES-GCM). The server stores ciphertext and metadata.
Decryption keys are transported in URL fragments such as #k or #rk and are not sent to the server.
Password-protected links use server-side password hashes plus additional client-side key wrapping (PBKDF2-SHA-256).
Expiry, view/submission limits, and one-time-read policies restrict access to sensitive content.
encrypted_payload, encrypted_key, crypto metadata, and access policy fields.hash_equals.
EncSend provides optional encrypted recovery artifacts for cross-device scenarios:
Security-relevant actions are logged (for example link issuance, access denied, password challenge steps, submission creation, and recovery updates).