Zero-Knowledge Architecture — Server Never Sees Plaintext PHI
DDSHARED encrypts every file client-side with AES-256-GCM before upload. Your encryption keys never leave your device. Even if our servers were compromised, your files remain encrypted with keys only you control.
What is zero-knowledge encryption?
Zero-knowledge encryption means the server never sees your plaintext data. DDSHARED encrypts all files client-side (in your browser or desktop app) before upload. The server stores only encrypted blobs.
Your encryption keys are transported via URL fragment (#key)—which is never sent
to the server per RFC 3986. This is the same model Firefox Send used before shutdown.
https://ddshared.com/share/abc123#key=xyz789 The key after # is never sent to the server—it stays in your browser.
How does AES-256-GCM encryption work?
AES-256-GCM is a symmetric encryption algorithm standardized by NIST SP 800-38D. It provides both:
- Confidentiality: Data is encrypted with a 256-bit key (2256 possible combinations)
- Authenticity: GCM mode detects tampering via authentication tags
GCM (Galois/Counter Mode) is faster than CBC mode, parallelizable, and prevents padding oracle attacks. DDSHARED uses 256-bit keys—the strongest AES variant approved for TOP SECRET classified information by the NSA.
How are encryption keys generated and managed?
DDSHARED uses a layered key architecture inspired by best practices:
256-bit key generated client-side using Web Crypto API (CSPRNG)
Derived from MK using HKDF-SHA256 per RFC 5869
Unique 256-bit key generated for each file
Each file is encrypted with its own MEK. The MEK is then wrapped (encrypted) with the KEK. Only the encrypted MEK is stored on the server. The master key travels only in the URL fragment, which is never sent to the server.
Where are encrypted files stored?
DDSHARED stores encrypted files on Cloudflare R2, a zero-egress-fee object storage compatible with AWS S3. Files are encrypted client-side before upload to R2.
R2 adds server-side encryption at rest (AES-256). This provides defense-in-depth:
- Layer 1: Client-side encryption (your keys)
- Layer 2: Server-side encryption at rest (Cloudflare's keys)
- Layer 3: TLS 1.3 in transit (ECDHE_RSA with AES-256-GCM)
Even if R2 were compromised, files remain encrypted with keys only you control. Cloudflare's server-side encryption adds an additional layer of protection.
How does DDSHARED track file access?
DDSHARED maintains an append-only audit log for every file operation (upload, download, share, delete, permission change). Logs are immutable—they cannot be edited or deleted, even by DDSHARED administrators.
Each audit entry includes:
- User ID and IP address
- Timestamp (UTC with millisecond precision)
- Action type (upload, download, share, delete, edit_permissions)
- File ID and file name (encrypted)
- Success/failure status
Audit logs can be exported in JSON or CSV format for HIPAA compliance reporting and OCR inspections. Logs are stored for 7 years (HIPAA requirement).
Can DDSHARED staff access my files?
No. DDSHARED uses zero-knowledge architecture. Your files are encrypted client-side before upload with keys only you control. DDSHARED servers store only encrypted blobs.
Even if DDSHARED engineers wanted to access your files, they cannot decrypt them without your master key (which never leaves your device). This is verified by our architecture:
- Master keys transported via URL fragment (never sent to server)
- File encryption happens in browser using Web Crypto API
- Server receives only encrypted blobs (no plaintext PHI)
- Server has no access to decryption keys
This is fundamentally different from traditional cloud storage (Google Drive, Dropbox) where the provider can decrypt your files.
Cryptographic Standards & Compliance
Encryption
AES-256-GCM
NIST SP 800-38DKey Derivation
HKDF-SHA256
RFC 5869Random Generation
Web Crypto API
W3C RecommendationTransport Security
TLS 1.3
RFC 8446Password Hashing
Argon2id
RFC 9106HIPAA Compliance
Built-in
45 CFR Part 160, 164Security FAQs
Zero-Knowledge Security for Your Practice
Experience true end-to-end encryption. Start your 14-day free trial today.
Start Free TrialLearn more: HIPAA Compliance • All Features