trust
your notes don't sit around in plain text. jottie encrypts everything at rest using aes-256-gcm. keys are managed securely. even if someone accessed the database, they'd see gibberish.
trust
powered by jottie
aes-256-gcm encryption
encrypted before storage
secure key management
why this works
aes-256-gcm encryption
encrypted before storage
secure key management
industry standard protection
examples
see how others use jottie for trust. try these prompts to get started.
try these
details
when you save a note, jottie encrypts it before writing to the database. keys are stored in google cloud kms, separate from the encrypted data. decryption happens only when you access your notes.
encrypt before storage
keys in kms
decrypt on access
how it works
details
databases get breached. it happens. encryption at rest means a breach exposes encrypted blobs, not readable notes. it's not paranoia, it's engineering.
why encryption matters
databases get breached. it happens. encryption at rest means a breach exposes encrypted blobs, not readable notes. it's not paranoia, it's engineering
questions
what encryption algorithm is used?
aes-256-gcm. it's authenticated encryption - tamper-evident and industry standard.
who has access to the keys?
keys are in google cloud kms with strict access controls. only the application can decrypt.
is data encrypted in transit too?
yes. all connections use tls. encryption at rest is in addition to transit encryption.
start with a single note, then use search or chat to pull the context back instantly.