"We use encryption" sounds reassuring. But who holds the encryption keys makes all the difference between genuine privacy and security theater. True zero-knowledge encryption means you—and only you—control the keys that protect your diary.
Understanding Encryption Fundamentals
Encryption transforms readable data into unreadable ciphertext using mathematical algorithms. Think of it like a sophisticated lock: plaintext goes in, ciphertext comes out. To reverse the process and read the data, you need the correct key.
Modern encryption is remarkably secure. Even the most powerful computers cannot break properly implemented encryption without the key. This mathematical guarantee makes encryption the foundation of digital privacy. But the security entirely depends on who controls the keys.
The Key Question: Who Can Unlock Your Data?
When apps claim "we use encryption," the critical follow-up question is: who has the keys? If the service provider holds keys, they can decrypt your data at will. If only you hold keys, your data remains private even from the service provider. This distinction separates real privacy from privacy theater.
Three Models of Encryption
Different applications use encryption in fundamentally different ways. Understanding these models reveals what level of privacy you actually have.
Model 1: Encryption in Transit Only
Many services encrypt data during transmission (using HTTPS) but store it unencrypted on their servers. Your diary entry travels securely from your device to their server, then gets stored in readable form in their database.
This protects against network eavesdropping but not against server breaches, employee access, or government demands. The company can read everything in their database. They're just promising not to, and securing the connection between you and them.
Model 2: Encryption at Rest with Provider Keys
More sophisticated services encrypt stored data but retain the encryption keys themselves. Your entries are stored encrypted, but the company can decrypt them whenever needed (for features, support, compliance, or data analysis).
This improves security against external attackers who breach the database without accessing the key storage system. But the company still has full access to your readable data. The encryption protects against some threats but not others.
Model 3: End-to-End Encryption with Client-Side Keys
True end-to-end encryption (zero-knowledge encryption) means data is encrypted on your device before transmission, stored encrypted on servers, and only decrypted on your devices using keys the service provider never possesses.
This is Hello Diary's model. We literally cannot decrypt your entries because we don't have your keys. This isn't a policy choice—it's technical reality. No amount of pressure, legal demands, or internal curiosity can give us access to your readable diary content.
How Client-Side Encryption Works
- Key Generation: Your device generates a unique encryption key during setup
- Local Storage: The key is stored only on your devices, never uploaded
- Encrypt Before Send: Data is encrypted on your device using your key
- Server Receives Ciphertext: We only ever see encrypted, unreadable data
- Download Encrypted: Other devices download still-encrypted data
- Decrypt Locally: Your devices decrypt using their local copy of your key
What Zero-Knowledge Actually Means
"Zero-knowledge" is a specific technical term in cryptography. It means the service provider has zero knowledge of your unencrypted data. They know you have data, they know approximately how much, but they cannot know what it says.
The Mathematical Guarantee
Zero-knowledge encryption isn't based on trust or promises. It's based on mathematics. Without your encryption key, breaking modern encryption would require computing resources that don't exist. We're not talking about "difficult to crack"—we're talking about mathematically infeasible even with all computers on Earth working for millions of years.
This mathematical certainty means your privacy doesn't depend on our integrity, our security practices, or our resistance to pressure. It depends on the laws of mathematics, which don't change with corporate policy or government demands.
What We Know vs. What We Don't
With zero-knowledge encryption, Hello Diary knows you have an account, when you access the app, approximately how much data you've stored, and when you made changes. We don't know what you wrote about, the emotional content of entries, specific words or phrases, topics discussed, or anything about the actual content.
This metadata minimization is intentional. We collect only what's necessary to provide the sync service, and nothing more. The less we know, the less we can be pressured to reveal.
The Trade-off: No Password Recovery
Zero-knowledge encryption has one significant drawback: if you lose your encryption key, your data is permanently unrecoverable. Nobody can reset your password and restore access because nobody has the decryption keys except you.
Why We Can't Help You Recover Lost Keys
Traditional services can reset passwords because they can access your data with or without your password. They authenticate you through security questions or email verification, then give you a new password while your data remains accessible to them.
With zero-knowledge encryption, we don't have access to your data. Your encryption key derives from your password (in a complex way that makes guessing impossible). If you lose your password and haven't backed up your key, the data is cryptographically locked forever.
This isn't a failure of the system—it's proof the system works. If we could recover your data without your key, that would mean we had access to your keys all along, and the zero-knowledge claim would be false. The inability to recover data proves the privacy guarantee is real.
Critical: Save Your Recovery Phrase
When you set up Hello Diary, you receive a recovery phrase. This is your backup encryption key.
- Write it down: On paper, not digitally
- Store it securely: In a safe place separate from your devices
- Never share it: Anyone with this phrase can read your diary
- Keep multiple copies: In different secure locations
- Test it works: Before relying on it completely
How Key Management Works
Understanding how encryption keys are generated, stored, and used helps demystify the technology protecting your diary.
Key Generation During Setup
When you first set up Hello Diary, your device generates a cryptographically random encryption key. This happens locally on your device using hardware random number generators that produce unpredictable values. The key is never sent to our servers during generation.
Your password (which you choose) and this random key are mathematically combined through a process called key derivation. This means your key is protected by your password, but neither your password nor your key ever leave your device in a form we can read.
Key Storage on Your Devices
Your encryption key is stored in your device's secure storage (like the iOS Keychain or Android Keystore). These are protected areas of your device that even other apps cannot access. The operating system protects your key with your device password or biometric authentication.
This means accessing your diary requires both having your device and unlocking it. Someone who steals your phone but doesn't know your unlock code cannot access your encryption key, and therefore cannot read your diary.
Key Synchronization Across Devices
When you add a new device to your Hello Diary account, you need to authorize it from an existing device. This authorization process securely transfers your encryption key from one device to another without passing it through our servers in a readable form.
The technical details involve cryptographic protocols that ensure only your authorized devices can receive your key. An attacker with your account password but without access to an existing authorized device cannot obtain your encryption key.
Verifying Zero-Knowledge Claims
How can you verify that Hello Diary truly implements zero-knowledge encryption rather than just claiming to? Several methods exist for technical verification.
Code Inspection
Our use of open-source encryption libraries (like libsodium or OpenSSL) means security researchers can verify the encryption implementation. The code that encrypts your data before upload is auditable. Independent experts can confirm that encryption happens client-side using keys that never leave your device.
Network Traffic Analysis
Technical users can inspect network traffic from Hello Diary. You'll see that data sent to our servers is encrypted gibberish, not readable text. This confirms that encryption happens before transmission, not on our servers after receiving plaintext.
The "Can They Read It" Test
A simple verification: ask us to show you a specific diary entry from your account. We cannot do this. We can confirm an encrypted entry exists, but we cannot show you the readable text. This practical test proves we don't have decryption access.
Comparing to Fake Zero-Knowledge
Some apps claim "zero-knowledge encryption" while implementing something less secure. Learning to identify fake zero-knowledge protects you from misleading marketing.
Red Flags for Fake Zero-Knowledge
Be suspicious if an app claims zero-knowledge encryption but offers password recovery without a recovery phrase. Provides search functionality on encrypted text without downloading all data to your device. Shows you content previews before you enter your password. Offers "smart features" that analyze your content server-side. Allows account access from any new device without existing device authorization.
These features are convenient, but they're incompatible with true zero-knowledge encryption. Their presence indicates the service has some level of access to your unencrypted data.
The Philosophy: Data Ownership
Client-side encryption keys represent more than technical security—they represent data ownership. Your diary entries are truly yours when only you can read them.
True Data Ownership Through Encryption
Experience a diary where you—and only you—hold the keys to your thoughts.
Take Control of Your DataConclusion: The Keys to Your Kingdom
Encryption keys are more than technical details—they're the fundamental determinant of who controls your data. When the service provider holds keys, they control your data regardless of their promises. When only you hold keys, you control your data regardless of pressure on the provider.
Hello Diary's zero-knowledge architecture puts you in control. Your encryption keys remain on your devices. Your diary entries remain encrypted everywhere else. This isn't about trusting us to protect your privacy—it's about mathematics making privacy violations impossible.
This is what true data ownership means: possessing the only keys to your own thoughts, with the technical certainty that nobody else can access them. Your diary, your keys, your privacy—guaranteed by cryptography, not corporate promises.