Encryption Workflow Diagram
The architecture below shows how your master password is used to derive a local key and never leaves your device.
Local-first cryptography. Empower AI agents to handle your life admin without ever exposing your keys.
The architecture below shows how your master password is used to derive a local key and never leaves your device.
PBKDF2 with600,000hashing iterations to resist brute-force attacks.AES-256-GCMfor confidentiality and integrity.