Architecture
The key system decisions
Client-side encryption boundary
Encryption and key handling stay in the browser so the backend becomes a ciphertext store rather than a privileged decryptor.
Key ownership first
The identity model starts from possession of keys, not from a traditional username-password account abstraction.
Explicit security narrative
The product explains its posture in user-facing language so verification is easier than blind trust.

