Back to Home
$ how-it-works --visual

HOW IT WORKS

End-to-End Encryption Flow

STEP 1: User Upload

You select a file to share

STEP 2: Key Generation

System generates secure keys

256-bit Note ID:a7f3...b2e9
256-bit Encryption Key:9c4d...7a1f

STEP 3: Client-Side Encryption

Your browser encrypts the file

Original File:

sensitive_data.txt

AES-GCM Encryption

Encrypted Data:

8a9f7e3d2c1b...encrypted...5f4e3d2c1a

STEP 4: Server Storage

Encrypted data stored in memory

Only encrypted data sent

Encryption key NEVER leaves your browser

Server cannot decrypt

No acces s to encryption key

Storage:

RAM only (no disk writes)

Access:

Via Note ID only

STEP 5: Shareable Link

You receive a secure link

Link Format:

ghostfile.com/[Note-ID]#[Encryption-Key]

Example:

ghostfile.com/a7f3b2e9#9c4d7a1f

STEP 6: Recipient Access

Recipient decrypts locally

1.

Server sends encrypted data using Note ID

2.

Browser uses key from URL to decrypt

3.

Original file restored in recipient's browser

4.

Note auto-destructs (one-time access)

🔒 SECURITY GUARANTEE

Zero Knowledge

Server never has encryption key

AES-256-GCM

Military-grade encryption

Memory Only

No persistent storage