We do not claim "Magic". We utilize a verifiable Transient Envelope Encryption model. Keys are managed strictly by cryptographic hardware and post-quantum algorithms, ensuring Zero Persistence of your secrets.
The secret payload is encrypted Client-Side using AES-256 in Galois/Counter Mode (GCM). This ensures authenticated encryption.
Our Internal KMS uses Kyber-1024 (NIST Post-Quantum standard) for key encapsulation, protecting DEKs against harvest-now-decrypt-later attacks.
The master seeds for our Internal KMS are protected by Cloud HSMs (AWS KMS / Google Cloud KMS) with FIPS 140-2 Level 3 validation.
Every client (Agent, Web UI, CLI) generates an ephemeral Curve25519 key pair to perform Elliptic-Curve Diffie-Hellman (ECDH) key agreement. Private keys never leave the device.
Enterprise customers can bring their own Customer Managed Key (CMK) to envelope our Internal KMS keys.
We strictly enforce TLS 1.3 with HSTS. All data is encrypted in transit, adding a secondary layer of protection.
The Ennote Platform employs a Zero-Persistence architecture where Data Encryption Keys (DEKs) are encapsulated by a master Key Encryption Key (KEK). We call this Ephemeral Key Exposure.
During specific actions - specifically Access Requests or Master Key Rotation - the system performs an automated, transient re-wrapping operation. During this process, DEKs are briefly decapsulated in volatile memory (RAM) exclusively to be immediately re-wrapped using a derived session key for the target recipient.
All databases and backups are encrypted at the storage level. Physical theft of disks yields no data.
We use Cloudflare WAF to block SQL injection, XSS, and volumetric attacks at the edge.
Engineers have no access to customer data keys. All administrative actions are logged and require MFA.
Security isn't just code; it's people and processes. We adhere to rigorous operational standards.
We offer Safe Harbor for good-faith security research. Please do not attempt DDoS or social engineering.
Start managing secrets with hardware-backed encryption today.