Security
Is CipherWrite Open Source?
Learn about CipherWrite's transparency approach, our commitment to verifiable security, and our open-source stance.
CipherWrite's encryption methodology is based on open, auditable cryptographic standards — AES-256 and PBKDF2 — that have been peer-reviewed by the global security community for decades.
- •Our encryption uses well-established, open standards (not proprietary algorithms)
- •We are transparent about our security architecture on our Security page
- •We welcome security researchers to audit our approach
- •Standard Notes: Open source, code on GitHub
- •CipherWrite: Open standards, transparent methodology
- •Google Docs: Proprietary, closed source
- •Notion: Proprietary, closed source
We prioritize verifiable security — using proven, open cryptographic standards that anyone can independently verify, rather than asking you to trust our code.
Read more about our security architecture and why encryption matters for writers.