A technical overview of TextNotepad's security architecture and privacy guarantees.
AES-256-GCM encryption
Client-side key generation
No plaintext server storage
Perfect forward secrecy
PBKDF2 key derivation
Salt-based protection
Keys never leave device
Secure key rotation
No server-side decryption
Encrypted metadata
Anonymous file headers
No content analysis
EU data centers
TLS 1.3 in transit
Encrypted at rest
Redundant backups
Third-party security audits
Open-source client
Penetration testing
Bug bounty program
GDPR compliant
ISO 27001 aligned
SOC 2 Type II
Regular compliance audits
User passwords are never stored or transmitted. Instead, we use a key derivation function (PBKDF2) with a unique salt to generate encryption keys locally. This ensures that even identical passwords result in different encryption keys.
All data on our servers is encrypted at rest using AES-256. Even if someone gained physical access to our servers, your notes would remain protected by multiple layers of encryption.
All communication uses TLS 1.3 with perfect forward secrecy. We also implement certificate pinning and strict transport security headers.
Even metadata like file names, folder structures, and timestamps are encrypted. We only store anonymous file identifiers and encrypted payloads.
Our client-side code is open source and available for audit. This allows security researchers to verify our encryption implementation and ensures transparency in our security claims.
If you discover a security vulnerability, please email us at info@textnotepad.com. We offer rewards for valid security reports through our bug bounty program.