Per-user DEK
Users hold their own AES‑256 CMK, protected by Passkey or recovery.
Users hold their own AES‑256 CMK, protected by Passkey or recovery.
Documents split into encrypted chunks, each secured with a unique IV.
Content, edit history, and snapshots — all equally encrypted.
01
The owner unlocks the file key with a passkey.
02
The app writes the 256-bit key to the KMS with a verified token.
03
Key exchange and encryption/decryption — in‑memory only, never persisted.
04
If the key expires, the editor asks the owner to unlock again.
The KMS is a local process with a narrow API, explicit token checks, and encrypted persistence around it.
The raw key service is not public and rejects non-local requests.
Access is bound to verified collaboration tokens, not broad service secrets.
Locked files clear plaintext and keep all payloads encrypted.