The Short Answer
Your data is encrypted on your device before it ever leaves. Rumus servers only store ciphertext—scrambled data that’s meaningless without your Secret Key. The company cannot decrypt your information.Our Security Principles
You Hold the Keys
Your Secret Key never leaves your device. It’s not uploaded, escrowed, or recoverable by Rumus. This deliberate design choice means if the servers are breached, attackers gain nothing useful.Encryption is Not Optional
Every sensitive piece of data receives encryption before storage. There are no unencrypted modes or exceptions for local storage and cloud synchronization alike.The Server is Blind
The server operates as “blind storage.” It receives ciphertext, stores ciphertext, and returns ciphertext—never seeing plaintext or holding keys. Even Rumus engineers cannot read user data.Transparency Through Standards
We use well-established, peer-reviewed cryptographic algorithms—not proprietary or experimental schemes. Every component remains open-source and auditable.How It Works
Your Secret Key
A 256-bit Secret Key is generated using cryptographically secure random generation during setup. The formatted key looks like:Your PIN
Daily vault access uses a short PIN that:- Stores your Secret Key in a Stronghold secure container
- Unlocks Stronghold via PIN to release the Secret Key
- Decrypts your vault with that key
The Encryption
All vault data uses XChaCha20-Poly1305, an authenticated encryption algorithm providing confidentiality and integrity protection. Why XChaCha20-Poly1305?| Property | Benefit |
|---|---|
| 256-bit key | Computationally infeasible to brute-force |
| 192-bit nonce | Safe to generate randomly without collision risk |
| Authenticated encryption | Detects any tampering with ciphertext |
| Constant-time execution | Resistant to timing side-channel attacks |
| No hardware dependency | Performs well on all devices |
What Happens When You Sync
Data encrypts locally on your device before uploading as ciphertext. The Rumus server stores encrypted data it cannot read. New devices download the ciphertext and decrypt it locally using the same Secret Key.What If…
…Rumus servers are breached?
Attackers would obtain only ciphertext, which—without your Secret Key—is computationally indistinguishable from random noise.…a Rumus employee goes rogue?
Employees have the same access as external attackers: ciphertext only. The architecture contains no backdoors, master keys, or recovery mechanisms for abuse.…someone steals my device?
Your Secret Key is protected by Stronghold, which encrypts it using your PIN. Stronghold provides memory encryption while running, automatic memory zeroing, encrypted disk snapshots, and brute-force protection with attempt limiting.…I forget my PIN?
You can reset your PIN using your Secret Key, making Secret Key backup essential.…I lose my Secret Key?
If device access is also lost, your data cannot be recovered. We cannot help you—we don’t have your key.Technical Deep Dive
Key Storage: Stronghold
Stronghold is a secure storage library developed by the IOTA Foundation, specifically designed to protect cryptographic keys with:- In-memory encryption
- Automatic zeroing when data is released
- Process isolation for key operations
- Cross-platform consistency