A look under the hood at how we ensure even we can't read your secrets.
Trust No One (Not Even Us)
At CipherSend, we believe you shouldn't have to trust the server to keep your secrets safe. That's why we offer client-side encryption. But what does that actually mean?
The Process
When you choose to encrypt a secret with a password on the client side, here is what happens before any data leaves your device:
1. Key Generation
Your password is not used directly as the encryption key. Instead, we use a Key Derivation Function (KDF) to turn your password into a cryptographically strong key. This makes it much harder for attackers to brute-force your password.
2. Encryption (AES-GCM)
We use the Web Crypto API, built directly into modern browsers, to encrypt your message using AES-GCM (Advanced Encryption Standard with Galois/Counter Mode). This provides both confidentiality (no one can read it) and integrity (no one can tamper with it).
3. Transmission
Only the encrypted blob is sent to our servers. The password you used to generate the key never leaves your browser.
Decryption
When the recipient opens the link:
- They are prompted for the password.
- Their browser derives the key from the password.
- The browser downloads the encrypted blob from our server.
- The decryption happens locally on their device.
Why This Matters
Because the server never sees the password or the raw secret, a compromise of our database would yield only useless, encrypted data. This architecture ensures that you are the true owner of your data.
Conclusion
Client-side encryption adds a powerful layer of defense. It ensures that privacy is mathematically enforced, not just promised by a privacy policy.
Was this article helpful?
Let us know so we can improve our content
Deploy secure secret sharing in minutes
Launch CipherSend across your team with zero setup and built-in best practices. Trusted by security leaders protecting their most sensitive data.
Continue learning
View all articlesSecure Communication
Secure communication online: Discover encrypted messaging apps, secure email, and privacy tools to protect against 2025 cyber threats. Expert guide. 2025 Online Safety: Protect Calls and Chats From ...
Cryptography
Learn cryptography basics for beginners: what encryption is, symmetric vs asymmetric, and how it works. Protect your data today. Ever Wondered How Encryption Actually Works? Here’s the Simple Truth ...
Cloud Storage Security
Secure cloud storage best practices to protect your data. Learn encryption, avoid misconfigurations, reduce breach risks. Why Keeping Your Cloud Data Safe Matters More Than Ever Did you know [83...
How to Securely Store and Transmit Sensitive Data
Master storing sensitive data securely with encryption, access controls, and monitoring. Practical guide for 2025 compliance. Why Keeping Your Data Safe is More Important Than Ever Did you know reg...