Question: What is really happening with data access/decryption #3219
Replies: 2 comments 6 replies
-
|
No worries about your question! Actually, technically a lot of the info on our help page already covers much of what makes the app more secure than other apps like Evernote, though were you looking to ask about something more specific? Or is there something about the end-to-end encryption on the app which you'd like more information about? Our knowledge base page also has some very helpful and simple explanations to certain topics about security and privacy 🙏 |
Beta Was this translation helpful? Give feedback.
-
|
Yes, I have read the help pages. Thank you. Let me rephrase what I am getting at. In the help pages there are statements such as this, " It also not possible to "brute-force" this data, as attempting to guess the key behind the encryption would take many thousand (or even million) years, even with a network of supercomputers." That is great that the data is so well encrypted to protect it against a brute for attack. However, if I am able to possibly hack into Standard Notes with an 8 or 10 character password and see the plaintext data then it would seem to negate all of that millions of supercomputer years of processing. I am attempting to understand what I see as a disparity between the two methods of data access. |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
On the main Standard Notes website there is a lot of talk around encryption algorithms, account keys, secret keys, etc. Indeed, when accessing my data on my personal machine I have a lengthy passphrase that I must enter to gain un-encrypted access. This makes me feel warm and fuzzy.
However, when accessing from my work computer I choose the do not stay logged in option so as not to leave the data on my work computer. When accessing it this way all I have to do is enter my email address and simple password.
My background is in using gpg where you need to have physical control of your private key and the passphrase to decrypt data. I am curious what is really happening here if all I need is email/pw. I'm struggling to understand how that is any more secure than other systems, such as Evernote, which require the same.
Please forgive me if this is a dumb question, but I am genuinely ignorant on what is happening with this, thus the question.
Any insight is appreciated. Thank you.
Beta Was this translation helpful? Give feedback.
All reactions