Resources
Our security model
An overview of how Privacy Guardian protects your data today—from end-to-end encryption to breach monitoring and passkeys. This page focuses on the mechanisms currently in the product, not future roadmaps or third-party certifications.
Architecture at a glance
The diagram below shows how your devices, the browser extension, our API, and the database fit together in the end-to-end encryption model. Encryption and decryption always happen on your devices before anything reaches our servers.
Tip: keep a copy of this diagram in internal docs to help teammates understand how Privacy Guardian's end-to-end encryption and zero-knowledge storage work.
Zero-knowledge design
Privacy Guardian is built as a zero-knowledge password manager. Your vault data is encrypted on your device before it is sent to our servers. The backend stores only ciphertext plus non-sensitive metadata (titles, folder IDs, timestamps).
- Client-side encryption: Encryption happens in the browser and extension, not on the server.
- No master password on the server: We never receive or store your master password or derived vault key.
- Encrypted at rest: Database rows for passwords, notes, WiFi keys, and OTP secrets contain only encrypted values.
For a deeper technical deep dive, see our technical documentation.
End-to-end encryption
Vault data is end-to-end encrypted using a key derived from your master password. The key is created on your device and kept in memory only for as long as your vault is unlocked.
- Key derivation: The client derives an encryption key using PBKDF2-HMAC-SHA-256 with a unique per-user salt and a high iteration count, making offline guessing significantly harder.
- Content encryption: Sensitive fields are encrypted with AES-256-GCM, using a fresh random IV (nonce) for every encryption operation.
- Integrity: AES-GCM provides an authentication tag; if ciphertext is modified, decryption fails instead of silently producing bad data.
Account & sign-in security
On top of encryption, Privacy Guardian includes features that help you keep accounts safe when you actually sign in to websites and apps.
- Strong password generation: Built-in generator creates long, random passwords and stores them directly in your vault.
- Overwatch security dashboard: Shows your overall security score, flags weak and reused passwords, and highlights sites where you can enable 2FA or passkeys.
- Built-in MFA / TOTP: Store and generate one-time codes alongside your passwords so you can use multi-factor authentication wherever it's available.
- Passkeys support: Save and manage passkeys so you can move away from passwords entirely on supported sites.
Breach monitoring & weak password detection
Privacy Guardian helps you understand where your credentials may already be exposed and where your passwords are too weak or reused.
- Breach checks: We integrate with public breach data sources to flag known compromised credentials and prompt you to change passwords.
- Password strength scoring: Each password gets a complexity score so you can quickly spot weak logins.
- Reuse detection: We use one-way hashes to detect when the same password is used across multiple sites without storing the plaintext password.
Browser extension & autofill
The Privacy Guardian browser extension brings your vault to Safari and Chrome so you can fill passwords securely without retyping them.
- Local unlocking: You unlock the extension with your master password or device biometrics; the decryption key lives only in the extension's memory.
- Safe autofill: The extension fills credentials only on the sites that match the URL you saved, helping to protect against phishing pages.
- No keystroke tracking: The extension only interacts with login forms when you explicitly ask it to save or fill a login.
What we do not claim (yet)
Today, Privacy Guardian does not advertise formal security certifications or third-party penetration test reports. This page describes the protections that are implemented in the product now, not aspirational features.
- No SOC 2, ISO 27001, or similar certifications are claimed.
- No public bug bounty or external audit program is currently in place.