TrustNote
A Decentralized, world’s top secure encrypted notes app
Get the iOS app on the App Store. Get the Android app on Google Play.
Based on cryptocurrency technology, TrustNote rearchitected the world's top secure encrypted notes app. With end-to-end encryption, all notes were strongly encrypted and were signed by user's private key, and were synced in real time with multiple servers and multiple devices.
 
 
What are you waiting for?
 
 
Why is TrustNote a real secure encrypted notes app?
A TrustNote block
Every note was encrypted and was signed with user’s private key, we call it a TrustNote block.
And, all the blocks build a virtual block-chain, looks like this:
Secure Encryption Algorithm
TrustNote encrypt notes by AES-256 encryption algorithm. The AES-256 is a military-grade, NSA-certified, currently the most secure encryption algorithm. The diagram below shows the process how TrustNote generates an AES-256 secret.
Secure Unique Key
TrustNote generates a global unique private key for every user by the same algorithm as Bitcoin generating a private key for users, and helps users back up the private key via mnemonic.
The security of Bitcoin is absolutely trustworthy, and so is TrustNote's private key.
End-to-End Encryption
TrustNote strongly encrypt notes by AES-256 encryption algorithm before they were sent to others over the network.
Therefore, no matter what type of network eavesdropping, attackers will get nothing while the notes were transmitting on the network.
TrustNote has the ability to promise you that nobody except yourself would know what you noted.
Data Signature
TrustNote signed notes with ECDSA algorithm by user’s private key. If a TrustNote block coming from network fails to pass the signature verification, this block will be discarded. So, even if the storage server was hacked, it is impossible to tamper with any of your notes by attackers.
Key Protection
To protect user’s private key, TrustNote encrypts the mnemonic(for generating/restoring deterministic private key) multiple times with AES-256 encryption algorithm by a password user set.
Completely Encrypted
TrustNote strongly encrypted the original contents of every note with AES-256 encryption algorithm by user’s private key and then save it into the local storage on user’s device.
Completely Decentralized
TrustNote does not have any centralized servers. All your notes were stored on a peer-to-peer network that you have full control of and synced by hubs like Github or ipfs all over the world.
TrustNote has the ability to keep notes synchronizing with multiple third-party servers and multiple devices in real time by block-chain technology.
Comparing with traditional network applications, there is no registration required, no sign in required.
But the most important thing is that you have to keep your private key mnemonic in a safe place.