Zero-knowledge encryption means your notes are encrypted before they ever leave your device. Not even Nevernote can read your notes.
The server never sees your passphrase or plaintext notes. If you forget your passphrase, we cannot recover your data.
Your passphrase is combined with a random salt using PBKDF2 with 100,000 iterations. This produces a 256-bit AES key. The salt is stored on the server, but without your passphrase, it's useless.
Notes are encrypted with AES-256-GCM, an authenticated encryption mode that provides both confidentiality and integrity. Each encryption uses a random 12-byte IV.
All cryptographic operations use the browser's native crypto.subtle API. No external crypto libraries. Runs in a secure context (HTTPS only).
Every time a note is saved, a new random Initialization Vector (IV) is generated. This ensures identical plaintext produces different ciphertext.
Metadata is required for sync and authentication. It doesn't reveal note contents.
{
"id": "note_abc123def456",
"encrypted": {
"iv": "Ek9mR2hKbFN...", // 12-byte random IV (base64)
"ciphertext": "U2FsdGVkX1..." // AES-256-GCM ciphertext
},
"hash": "a1b2c3d4e5f6...", // SHA-256 first 16 chars (for sync)
"updatedAt": "2026-01-04T10:30:00Z",
"folderId": "folder_xyz789" // Unencrypted for indexing
}
The encrypted object contains both the IV and ciphertext. To decrypt, you need the IV, ciphertext, and your derived AES key (from passphrase + salt).
ID tokens verified using Google's OAuth2Client library. Nevernote is a Google-verified application with no security warnings.
ID tokens verified using JWKS (JSON Web Key Set) from Microsoft's discovery endpoint.
ID tokens verified using Apple's JWKS. Supports "Hide My Email" for additional privacy.
Link multiple OAuth providers (Google, Microsoft, Apple) to the same Nevernote account. One passphrase, multiple sign-in options.
We cannot recover your data. This is the trade-off of zero-knowledge encryption. We recommend using a password manager to store your passphrase.
No. Your notes are encrypted before leaving your browser. We only store ciphertext. Without your passphrase, the data is unreadable.
AI processing (summaries, transcription) sends data to Google Gemini in plaintext. This is optional and clearly marked. The AI results are then encrypted before storage.
Not currently, but our encryption implementation uses standard Web Crypto APIs and well-documented algorithms. We're transparent about our security architecture.