Privacy Policy
Last Updated: August 20, 2025
1. General Provisions
At Enqrypted ('website'), user privacy, absolute confidentiality, and a zero-knowledge, no-log architecture are fundamental principles. We operate under a true zero-knowledge model. We cannot and do not store personal information, message content, metadata, or encryption keys on our servers. All cryptographic operations run entirely client-side in your browser.
2. Information We Collect
Personal Data: NONE
Enqrypted does not request, collect, store, or retain any personal information including: names, emails, phone numbers; IP addresses or location data; device identifiers or browser fingerprints; account credentials or user profiles; message content, file content, or metadata; timestamps, recipient information, or communication patterns.
Technical Data: Minimal & Anonymous Only
We may collect fully anonymized, aggregate metrics solely for: system uptime monitoring; performance optimization; basic traffic statistics (total requests, not individual sessions).
3. Cookies and Similar Technologies
We use minimal, anonymous cookies strictly for: Essential website functionality (including secure user authentication and CSRF token protection); anonymous, aggregate analytics (no personal data).
4. Purpose of Data Use
Our limited data processing serves only to: maintain system performance and reliability; prevent abuse and ensure service availability; generate anonymized traffic statistics.
5. Security & Cryptography
Zero-Knowledge Architecture
All encryption/decryption happens locally in your browser. We never possess plaintext data, derived keys, or passwords.
Cryptographic Specifications
- Key Derivation: Argon2id: Time cost (t): 3 iterations; Memory cost (m): 256 MB; Parallelism: Adaptively selected per device; Unique, cryptographically secure random salt per secret/password
- Authenticated Encryption: XChaCha20-Poly1305 (AEAD): Unique 24-byte nonce per encryption; 128-bit authentication tag for tamper detection; 256-bit symmetric keys derived client-side
- Randomness: All nonces and salts generated using cryptographically secure PRNG (Web Crypto API)
Security Guarantees
Through our zero-knowledge architecture and strong encryption mechanisms, it is mathematically impossible to decrypt your data without the required key. Encryption keys are generated entirely by you and exist only in your possession and with the person you share the message with. No one, including us, can read your data without access to these keys.
6. User Responsibilities
Safeguard and transmit QR codes, links, and passwords via secure, separate channels; Use strong, unique passwords - lost passwords cannot be recovered; Understand that expired or single-use links become permanently inaccessible; Maintain good operational security practices on your devices.
Your overall security depends on these practices beyond our platform's technical protections.
7. Payments (Cryptocurrency / No KYC)
Cryptocurrency payments are accepted via Coinbase Commerce without KYC requirements; No collection of billing names, card details, or government IDs; No association of wallet addresses with user identities.
Note: Blockchain transactions are publicly visible by nature. While Coinbase Commerce processes payments, it does not require KYC information. Review your wallet provider's privacy practices for additional protection.
8. Third-Party Service Providers
Limited to anonymized, aggregate analytics for uptime/performance monitoring. No user content, passwords, keys, metadata, or personally identifiable information is ever shared
9. Data Retention & Deletion
All data (messages, files, keys, salts, nonces) exists only temporarily during client-side operations; Data is destroyed from memory/storage immediately after cryptographic operations complete; Zero server-side storage - no backups, logs, or copies maintained; No data recovery possible once deleted.
10. Legal Compliance
11. Disclaimer & Limitations
12. Changes to This Policy
Significant changes will be published here with an updated 'Last Updated' date; Major policy changes will be announced prominently on the website; We recommend reviewing this policy periodically.
13. Contact & Transparency
Contact us via the secure contact page on our website.
We value complete transparency about our privacy practices and your absolute digital privacy. This policy reflects our genuine technical capabilities and limitations. We believe in honest privacy, not privacy theater.