Skip to main content

The Short Answer

Your data is encrypted on your device before it ever leaves. Rumus servers only store ciphertext—scrambled data that’s meaningless without your Secret Key. The company cannot decrypt your information.

Our Security Principles

You Hold the Keys

Your Secret Key never leaves your device. It’s not uploaded, escrowed, or recoverable by Rumus. This deliberate design choice means if the servers are breached, attackers gain nothing useful.

Encryption is Not Optional

Every sensitive piece of data receives encryption before storage. There are no unencrypted modes or exceptions for local storage and cloud synchronization alike.

The Server is Blind

The server operates as “blind storage.” It receives ciphertext, stores ciphertext, and returns ciphertext—never seeing plaintext or holding keys. Even Rumus engineers cannot read user data.

Transparency Through Standards

We use well-established, peer-reviewed cryptographic algorithms—not proprietary or experimental schemes. Every component remains open-source and auditable.

How It Works

Your Secret Key

A 256-bit Secret Key is generated using cryptographically secure random generation during setup. The formatted key looks like:
XX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XX
Loss of this key without PIN access means data cannot be recovered by anyone.

Your PIN

Daily vault access uses a short PIN that:
  1. Stores your Secret Key in a Stronghold secure container
  2. Unlocks Stronghold via PIN to release the Secret Key
  3. Decrypts your vault with that key
This balances PIN convenience with 256-bit key security.

The Encryption

All vault data uses XChaCha20-Poly1305, an authenticated encryption algorithm providing confidentiality and integrity protection. Why XChaCha20-Poly1305?
PropertyBenefit
256-bit keyComputationally infeasible to brute-force
192-bit nonceSafe to generate randomly without collision risk
Authenticated encryptionDetects any tampering with ciphertext
Constant-time executionResistant to timing side-channel attacks
No hardware dependencyPerforms well on all devices

What Happens When You Sync

Data encrypts locally on your device before uploading as ciphertext. The Rumus server stores encrypted data it cannot read. New devices download the ciphertext and decrypt it locally using the same Secret Key.

What If…

…Rumus servers are breached?

Attackers would obtain only ciphertext, which—without your Secret Key—is computationally indistinguishable from random noise.

…a Rumus employee goes rogue?

Employees have the same access as external attackers: ciphertext only. The architecture contains no backdoors, master keys, or recovery mechanisms for abuse.

…someone steals my device?

Your Secret Key is protected by Stronghold, which encrypts it using your PIN. Stronghold provides memory encryption while running, automatic memory zeroing, encrypted disk snapshots, and brute-force protection with attempt limiting.

…I forget my PIN?

You can reset your PIN using your Secret Key, making Secret Key backup essential.

…I lose my Secret Key?

If device access is also lost, your data cannot be recovered. We cannot help you—we don’t have your key.

Technical Deep Dive

Key Storage: Stronghold

Stronghold is a secure storage library developed by the IOTA Foundation, specifically designed to protect cryptographic keys with:
  • In-memory encryption
  • Automatic zeroing when data is released
  • Process isolation for key operations
  • Cross-platform consistency

The Bottom Line

Rumus operates on a simple premise: your secrets should be yours alone. We use proven cryptographic algorithms, secure key storage, and a zero-knowledge server architecture ensuring data remains private—even from Rumus itself. When you sync your vault to the cloud, you’re not trusting Rumus with your data. You’re trusting mathematics.