01
Plaintext never on the server
Encryption happens in the recipient's and owner's browser via a Rust-compiled WASM module. The server receives ciphertext on upload and only re-wraps keys for authorized recipients — held in memory only long enough to compute, then erased.
02
Boot locked. Unseal with three keys.
The engine starts sealed. Three of five Shamir shares — held by three different people — unseal it. A stolen running container is inert. A stolen database dump is inert.
03
Audit that proves itself, offline
Every action chains to the previous with a hybrid signature. An auditor can verify the chain on a laptop with no network, no private keys, no trust in the running server. The audit table is read-only at the database role level.
04
Quantum-ready, today
Hybrid encryption combines X25519 with ML-KEM-768 (NIST FIPS 203). Hybrid signatures combine Ed25519 with ML-DSA-65 (FIPS 204). One algorithm falling does not unlock your archive.
05
Decide who, when, and from where
Time windows, IP ranges, maximum-use counts, and reusable hash-pinned templates. The use-count decrement, the policy evaluation, and the audit row commit atomically — no race, no double-spend.
06
Share to outsiders, link-leak-proof
The share link is only an identifier. Access requires a six-digit code, mailed separately to the bound recipient — hashed in storage, single-use, attempt-capped, rate-limited, ten-minute TTL.
07
View without ever downloading
Documents render in the browser, watermarked with recipient email and timestamp, inside the granted access window only. On Windows desktop, the viewer is excluded from screen captures by the OS. On macOS, active recording is detected and the watermark ramps.
08
One ingress, no extra doors
A single TLS endpoint fronts everything. The database, blob store, document server, render pipeline, and mailer have no host port exposed. Even encrypted blobs proxy through an auth-gated server endpoint.
09
Drop into your directory
LDAPS bind authentication runs side-by-side with local accounts. New directory users are created on first login; users who leave the directory are soft-disabled — audit history and document ownership are never deleted.
10
Make it your platform
Your super-admin uploads a logo, sets a name, picks an accent. The whole application — login, admin, viewer, emails, favicon, app icon — rebrands in place.