Security Infrastructure.
The Smart Notes security model is built on the principle of Inherent Sovereignty. We assume the network is compromised and the cloud is public.
1. On-Device Encryption
Your knowledge base is encrypted using AES-256 with keys derived from your device’s biometric/passcode hardware (Secure Enclave).
2. Sandbox Architecture
The Smart Notes app runs in a strict sandbox. It does not have access to your contacts, photos, or other sensitive files unless you explicitly grant permission for a specific capture event.
3. Verification Protocols
We use mathematical verification for our core sync protocols to ensure that no “Man-in-the-Middle” can intercept your notes, even if they control the server infrastructure.
“Security is a process, not a state.”
4. Responsible Disclosure
If you believe you’ve found a vulnerability, please contact us at [email protected].