Open Security Architecture

Transparency
by Design.

We believe security shouldn't be a black box. Our cryptographic architecture is open for review, audited, and designed to be mathematically untouchable.

Zero Knowledge

We Can't See Your Data.

Your encryption keys never leave your device. Even we can't access your files — only you and those you explicitly share with can decrypt your data. This ensures that your privacy is preserved, even in the event of a compromised server.

Client-side Encryption
Private Key Argon2
No Unencrypted Keys
The Tech Stack

Battle-Tested Cryptography

We don't rely on obscurity. We use battle-tested, open-standard cryptographic primitives to ensure your data remains secure against current and future threats.

MLKEM Key Encapsulation

Quantum-resistant key encapsulation mechanism securing asymmetric key exchanges against future threats.

AES-256 Encryption

Industry-standard symmetric encryption with 256-bit keys. Your files are encrypted in transit and at rest.

Argon2 Key Derivation

Winner of the Password Hashing Competition. Securely derives keys from your password with high computational cost.

Hybrid Encryption

Combines the efficiency of symmetric encryption with the convenience of public-key cryptography.

See Encryption in Action

Experience how Dragbin protects your files in real-time. No black boxes—just pure, transparent mathematics.

E2E Encryption Visualizer

ProgressReady

This visualizer has two flows:

1. Backup: You encrypt a file locally. The session key is wrapped with YOUR public key so only you (after re-deriving your user key) can decrypt later.

2. Sharing: File encrypted once with a symmetric session key; that session key is wrapped with the RECIPIENT public key (hybrid encryption).

Manual mode (default): Each step is a scrollable 'card'. You must reach the bottom to unlock the Next button. This forces reading/learning pacing.

Auto mode: Cinematic slow-motion timeline. You can pause / resume and adjust speed.

Core principles: confidentiality (plaintext never leaves the client), integrity (AEAD), authenticity (verified recipient key), forward secrecy boundaries (fresh per-file session key).

Security Principles

Designed for Truth, Not Just Trust

Our security model is based on the principle that you shouldn't have to trust us. We build systems that enforce privacy through mathematics, not just policy.

Client-side encryption before upload
Private keys encrypted with Argon2
No unencrypted keys stored or transmitted
Secure recipient-specific key sharing
Auditable open-source client code
Secure by default

Ready for Quantum-Safe Storage?

Join thousands of users who trust us with their most important files. Get started with 25GB of secure, encrypted storage—free forever.