Transparency
by Design.
We believe security shouldn't be a black box. Our cryptographic architecture is open for review, audited, and designed to be mathematically untouchable.
We Can't See Your Data.
Your encryption keys never leave your device. Even we can't access your files — only you and those you explicitly share with can decrypt your data. This ensures that your privacy is preserved, even in the event of a compromised server.
Battle-Tested Cryptography
We don't rely on obscurity. We use battle-tested, open-standard cryptographic primitives to ensure your data remains secure against current and future threats.
Quantum-resistant key encapsulation mechanism securing asymmetric key exchanges against future threats.
Industry-standard symmetric encryption with 256-bit keys. Your files are encrypted in transit and at rest.
Winner of the Password Hashing Competition. Securely derives keys from your password with high computational cost.
Combines the efficiency of symmetric encryption with the convenience of public-key cryptography.
See Encryption in Action
Experience how Dragbin protects your files in real-time. No black boxes—just pure, transparent mathematics.
E2E Encryption Visualizer
This visualizer has two flows:
1. Backup: You encrypt a file locally. The session key is wrapped with YOUR public key so only you (after re-deriving your user key) can decrypt later.
2. Sharing: File encrypted once with a symmetric session key; that session key is wrapped with the RECIPIENT public key (hybrid encryption).
Manual mode (default): Each step is a scrollable 'card'. You must reach the bottom to unlock the Next button. This forces reading/learning pacing.
Auto mode: Cinematic slow-motion timeline. You can pause / resume and adjust speed.
Core principles: confidentiality (plaintext never leaves the client), integrity (AEAD), authenticity (verified recipient key), forward secrecy boundaries (fresh per-file session key).
Designed for Truth, Not Just Trust
Our security model is based on the principle that you shouldn't have to trust us. We build systems that enforce privacy through mathematics, not just policy.
