Learn how we protect your files with enterprise-grade security and optional zero-knowledge encryption
Our platform offers a robust file storage architecture with two security levels, designed to meet different compliance requirements.
Secure storage with AWS-managed encryption
End-to-end encryption where not even system administrators can access your file contents
Encryption Mode Recommendation
We recommend using Standard Mode as it enables AI-powered validation to automatically verify if your compliance files are filled out correctly. However, if you need to store highly confidential information, you can enable Zero Knowledge Mode, which provides maximum privacy but disables automatic AI validation.
All files are stored in Amazon S3 buckets configured with the strictest security policies.
Data Classification
All buckets are classified and tagged with: DataClassification: Sensitive, Compliance: Required, Purpose: File storage bucket for organization documents - Compliance Retention
Zero Knowledge architecture is an end-to-end encryption system where your files are encrypted in your browser before being sent to the server.
Protection: Uses Argon2id algorithm (resistant to brute force attacks) to derive a key from your password, which then encrypts your private key with AES-256-GCM.
Protection: Uses ECDH (Elliptic Curve Diffie-Hellman) algorithm to create a unique shared secret between each user and the organization.
Configuration used:
Security Chain
If any link in this chain is missing, the file remains inaccessible. Not even system administrators can break this chain.
Optional Encryption
Zero Knowledge encryption is optional and can be enabled per organization. Only owners or administrators can enable it.
We cannot reset your password without you losing access to encrypted files
Available options:
AES-256-GCM
ECDH with P-256 curve
Argon2id
SHA-256
The impact is minimal. Encryption happens in your browser using hardware acceleration (AES-NI on modern processors). For files up to 100 MB, the difference is imperceptible. For larger files, there may be a few extra seconds.
Since your password is the only way to decrypt your private key, you would lose access to encrypted files. Therefore, we recommend:
• Use a trusted password manager
• Set up a strong password hint
• An administrator can re-encapsulate the TMK for a new key of yours (you won't lose access to organization files)
No. This is the essence of Zero Knowledge - not even we can access your files without your password. An organization administrator can grant access again through TMK re-encapsulation, but your old private key will be inaccessible.
We don't recommend it, but it's technically possible:
1. New uploads will not be encrypted
2. Already encrypted files remain encrypted
3. You will need to decide if you want to decrypt and re-upload old files
Visual indicators:
• "Encrypted" badge appears on files
• Metadata shows algorithm and version
• Audit logs record key operations
• You can inspect raw data in S3 (it will be unreadable)
Encrypted files can only be accessed by organization members who have the encapsulated TMK. To share externally:
• Add the person as an organization member (will receive TMK)
• Download and re-upload the decrypted file through another means
• Use temporary sharing links (future feature)
Partially. Content is fully protected, but some metadata remains visible:
• File name
• File size
• Upload date
• MIME type
• Who uploaded it
This is necessary for basic functionality (search, sorting, etc.). If you need full metadata protection, contact us for custom solutions.
Encryption does not affect listing or search performance, as these operations use only metadata (not encrypted). Decryption only happens when you download/view the file.
For questions about encryption activation, key problems, compliance and auditing, or customizations, please contact our team.
Email Support
Contact your administrator or our support team
Documentation
Check our technical documentation for more details