Why zero knowledge protocol is so important?
Data privacy protection is our number one priority. Our security architecture ensures that no one will be able to look around in your Private Email, ever! Even the Email developers will not have access to your login credentials. Unlike "Free Emails" we are unable to see your communications.
Encryption
The Safe encrypts all client data using highly secure and internationally renowned encryption methods. The key, which is needed for decryption, is calculated directly from the user vault using PBKDF#2 (RFC 2898). User vaults are therefore well-protected against ill-intentioned hackers.
Long-term security
We use AES-256 and RSA-4096 encryption standards. These encryption methods have been designed to offer long-term protection.
Double protection during file transfer
The Safe encrypts data twice during uploading or downloading from a device to a user's online account. In addition to transfer encryption (HTTPS), data is also encrypted using an AES-256 encryption, thus ensuring complete protection of sensitive data. This means that data will remain protected even in the event the HTTPS protection is attacked. The additional encryption is particularly efficient in protecting against man-in-the-middle-attacks (MitM), for example in internet cafés and airports.
Transparent crypto architecture
All data stored in Safe accounts is encrypted by way of a multi-layered cryptographic architecture. Our security architecture has been made openly available with multiple testing by third parties.
The Safe encrypts all client data using highly secure and internationally renowned encryption methods. The key, which is needed for decryption, is calculated directly from the user vault using PBKDF#2 (RFC 2898). User vaults are therefore well-protected against ill-intentioned hackers.
Long-term security
We use AES-256 and RSA-4096 encryption standards. These encryption methods have been designed to offer long-term protection.
Double protection during file transfer
The Safe encrypts data twice during uploading or downloading from a device to a user's online account. In addition to transfer encryption (HTTPS), data is also encrypted using an AES-256 encryption, thus ensuring complete protection of sensitive data. This means that data will remain protected even in the event the HTTPS protection is attacked. The additional encryption is particularly efficient in protecting against man-in-the-middle-attacks (MitM), for example in internet cafés and airports.
Transparent crypto architecture
All data stored in Safe accounts is encrypted by way of a multi-layered cryptographic architecture. Our security architecture has been made openly available with multiple testing by third parties.