Skip to main content

Zero-Knowledge Architecture — Server Never Sees Plaintext PHI

DDSHARED encrypts every file client-side with AES-256-GCM before upload. Your encryption keys never leave your device. Even if our servers were compromised, your files remain encrypted with keys only you control.

What is zero-knowledge encryption?

Zero-knowledge encryption means the server never sees your plaintext data. DDSHARED encrypts all files client-side (in your browser or desktop app) before upload. The server stores only encrypted blobs.

Your encryption keys are transported via URL fragment (#key)—which is never sent to the server per RFC 3986. This is the same model Firefox Send used before shutdown.

https://ddshared.com/share/abc123#key=xyz789

The key after # is never sent to the server—it stays in your browser.

How does AES-256-GCM encryption work?

AES-256-GCM is a symmetric encryption algorithm standardized by NIST SP 800-38D. It provides both:

  • Confidentiality: Data is encrypted with a 256-bit key (2256 possible combinations)
  • Authenticity: GCM mode detects tampering via authentication tags

GCM (Galois/Counter Mode) is faster than CBC mode, parallelizable, and prevents padding oracle attacks. DDSHARED uses 256-bit keys—the strongest AES variant approved for TOP SECRET classified information by the NSA.

How are encryption keys generated and managed?

DDSHARED uses a layered key architecture inspired by best practices:

1. Master Key (MK)

256-bit key generated client-side using Web Crypto API (CSPRNG)

2. Key Encryption Key (KEK)

Derived from MK using HKDF-SHA256 per RFC 5869

3. Media Encryption Key (MEK)

Unique 256-bit key generated for each file

Each file is encrypted with its own MEK. The MEK is then wrapped (encrypted) with the KEK. Only the encrypted MEK is stored on the server. The master key travels only in the URL fragment, which is never sent to the server.

Where are encrypted files stored?

DDSHARED stores encrypted files on Cloudflare R2, a zero-egress-fee object storage compatible with AWS S3. Files are encrypted client-side before upload to R2.

R2 adds server-side encryption at rest (AES-256). This provides defense-in-depth:

  • Layer 1: Client-side encryption (your keys)
  • Layer 2: Server-side encryption at rest (Cloudflare's keys)
  • Layer 3: TLS 1.3 in transit (ECDHE_RSA with AES-256-GCM)

Even if R2 were compromised, files remain encrypted with keys only you control. Cloudflare's server-side encryption adds an additional layer of protection.

How does DDSHARED track file access?

DDSHARED maintains an append-only audit log for every file operation (upload, download, share, delete, permission change). Logs are immutable—they cannot be edited or deleted, even by DDSHARED administrators.

Each audit entry includes:

  • User ID and IP address
  • Timestamp (UTC with millisecond precision)
  • Action type (upload, download, share, delete, edit_permissions)
  • File ID and file name (encrypted)
  • Success/failure status

Audit logs can be exported in JSON or CSV format for HIPAA compliance reporting and OCR inspections. Logs are stored for 7 years (HIPAA requirement).

Can DDSHARED staff access my files?

No. DDSHARED uses zero-knowledge architecture. Your files are encrypted client-side before upload with keys only you control. DDSHARED servers store only encrypted blobs.

Even if DDSHARED engineers wanted to access your files, they cannot decrypt them without your master key (which never leaves your device). This is verified by our architecture:

  • Master keys transported via URL fragment (never sent to server)
  • File encryption happens in browser using Web Crypto API
  • Server receives only encrypted blobs (no plaintext PHI)
  • Server has no access to decryption keys

This is fundamentally different from traditional cloud storage (Google Drive, Dropbox) where the provider can decrypt your files.

Cryptographic Standards & Compliance

Encryption

AES-256-GCM

NIST SP 800-38D

Key Derivation

HKDF-SHA256

RFC 5869

Random Generation

Web Crypto API

W3C Recommendation

Transport Security

TLS 1.3

RFC 8446

Password Hashing

Argon2id

RFC 9106

HIPAA Compliance

Built-in

45 CFR Part 160, 164

Security FAQs

Zero-Knowledge Security for Your Practice

Experience true end-to-end encryption. Start your 14-day free trial today.

Start Free Trial

Learn more: HIPAA ComplianceAll Features