Hardened Shell

Security Infrastructure.

The Smart Notes security model is built on the principle of Inherent Sovereignty. We assume the network is compromised and the cloud is public.

1. On-Device Encryption

Your knowledge base is encrypted using AES-256 with keys derived from your device’s biometric/passcode hardware (Secure Enclave).

2. Sandbox Architecture

The Smart Notes app runs in a strict sandbox. It does not have access to your contacts, photos, or other sensitive files unless you explicitly grant permission for a specific capture event.

3. Verification Protocols

We use mathematical verification for our core sync protocols to ensure that no “Man-in-the-Middle” can intercept your notes, even if they control the server infrastructure.

“Security is a process, not a state.”

4. Responsible Disclosure

If you believe you’ve found a vulnerability, please contact us at [email protected].