Your data is encrypted.
Not even we can read it.
SilentSuite uses end-to-end encryption to ensure your calendar, contacts, and tasks remain completely private. Here's exactly how it works.
End-to-end encryption
All data is encrypted on your device before it leaves. Calendar events, contacts, and tasks are encrypted using XChaCha20-Poly1305. The server only ever sees encrypted blobs.
Zero-knowledge architecture
The server cannot read, analyze, or share your data. Not even SilentSuite employees can access it. This is enforced cryptographically, not just by policy.
Password-derived keys
Your encryption keys are derived from your password using Argon2id, a memory-hard key derivation function designed to resist brute-force attacks. Your password never leaves your device.
Your Data, Your Control
Your data is encrypted on your device before it ever reaches our servers. With zero-knowledge architecture, your data stays private regardless of where it is stored. Self-host for complete sovereignty.
Open source
The SilentSuite server, sync engine, and client applications are open source. Anyone can inspect, audit, and verify the encryption implementation.
Battle-tested protocol
Built on the Etebase protocol, a proven end-to-end encryption framework designed specifically for structured data like calendars, contacts, and tasks.
How encryption works
1. Keys derived locally
Your password is used to derive encryption keys on your device using Argon2id. Keys never leave your device.
2. Encrypted before sync
Every event, contact, and task is encrypted with XChaCha20-Poly1305 on your device before being sent to the server.
3. Server stores blobs
The server stores only encrypted blobs. It has no keys to decrypt them. Your data is safe even in a breach.
Unlike Google Calendar or iCloud
Most productivity tools have full access to your data in plaintext. SilentSuite is fundamentally different.
| SilentSuite | Apple iCloud | ||
|---|---|---|---|
| End-to-end encrypted | Yes | No | Partial |
| Provider can read your data | No | Yes | Yes |
| Open source | Yes | No | No |
| Self-hostable | Yes | No | No |
| Data sovereignty | Yes (self-host or hosted) | No | No |
| Data used for advertising | Never | Yes | No |
Ready to take back your privacy?
Sign up and experience truly private productivity tools today.
Get Started