Plain-English details on how DeadDrop protects your data.
Last updated:
Your content is encrypted on your device before it leaves. We store ciphertext only.
We cannot decrypt your Drops. Keys are never shared with our servers in plaintext.
Small files and multi-part large files are encrypted chunk-by-chunk with authenticated encryption.
Each Drop has its own randomly generated Data Encryption Key (DEK). Your device encrypts the Drop’s message and attachments with the DEK using authenticated encryption (AES-256-GCM). The encrypted result (ciphertext + authentication tag) is sent to our servers for storage and delivery.
Attachments are encrypted on-device. For large files, we use multi-part encryption: your file is split into parts, each part is encrypted with AES-GCM and uploaded. We derive a unique IV per part (non-repeating, part-specific) and include an authentication tag so tampering is detected.
Your private keys are kept in a secure local vault on your device. To bring a second device online, you use a short-lived pairing channel. Devices exchange encrypted setup messages via the relay, and only the devices can read them.
DeadDrop can release a Drop on a fixed date/time or after a period of inactivity (heartbeat not seen). Heartbeats are lightweight authenticated pings your device sends. If the deadline passes without a heartbeat, the server delivers your encrypted Drop to the chosen recipients.
Because we use end-to-end encryption, we can’t recover content without your keys. We recommend:
See also the FAQ for practical guidance.
We continuously improve DeadDrop’s security. If we make material changes, we’ll update this page and the app. For operational uptime and incidents, visit the Status page. For questions, Contact Us.