Skip to content

How Encryption Works

SilentSuite uses end-to-end encryption (E2EE) so that your data is never readable by anyone except you -- not even the SilentSuite server.

The Basics

  • All encryption and decryption happens on your device.
  • Your password is used to derive encryption keys using Argon2 (a memory-hard key derivation function designed to resist brute-force attacks).
  • Data is encrypted using XChaCha20-Poly1305, a modern authenticated encryption algorithm.
  • The server only ever stores and transmits encrypted blobs. It cannot decrypt them.

What's Encrypted

Everything.

  • Calendar event titles, dates, locations, descriptions, and reminders
  • Contact names, emails, phone numbers, addresses, and notes
  • Task titles, due dates, priorities, and notes

There is no toggle to turn encryption on or off. Encryption is the architecture, not a feature.

What the Server Can See

The server knows:

  • That you have an account
  • How much encrypted data is stored
  • When data was last synced

The server cannot see:

  • The contents of any event, contact, or task
  • How many events, contacts, or tasks you have (data is stored in encrypted collections, not individually)
  • Any plaintext whatsoever

What Happens If You Forget Your Password

Since encryption keys are derived from your password and the server never has access to your keys, there is no password reset. If you forget your password, your data cannot be recovered.

We strongly recommend:

  • Using a password manager to store your SilentSuite password
  • Writing down your password and storing it in a secure physical location

The Etebase Protocol

SilentSuite is built on the Etebase protocol, an open and auditable end-to-end encryption protocol. You can review the protocol specification and cryptographic design at docs.etebase.com.

Released under the AGPL-3.0 License.