Security

Your data is encrypted.
Not even we can read it.

SilentSuite uses end-to-end encryption to ensure your calendar, contacts, and tasks remain completely private. Here's exactly how it works.

End-to-end encryption

All data is encrypted on your device before it leaves. Calendar events, contacts, and tasks are encrypted using XChaCha20-Poly1305. The server only ever sees encrypted blobs.

Zero-knowledge architecture

The server cannot read, analyze, or share your data. Not even SilentSuite employees can access it. This is enforced cryptographically, not just by policy.

Password-derived keys

Your encryption keys are derived from your password using Argon2id, a memory-hard key derivation function designed to resist brute-force attacks. Your password never leaves your device.

Your Data, Your Control

Your data is encrypted on your device before it ever reaches our servers. With zero-knowledge architecture, your data stays private regardless of where it is stored. Self-host for complete sovereignty.

Open source

The SilentSuite server, sync engine, and client applications are open source. Anyone can inspect, audit, and verify the encryption implementation.

Battle-tested protocol

Built on the Etebase protocol, a proven end-to-end encryption framework designed specifically for structured data like calendars, contacts, and tasks.

How encryption works

1. Keys derived locally

Your password is used to derive encryption keys on your device using Argon2id. Keys never leave your device.

2. Encrypted before sync

Every event, contact, and task is encrypted with XChaCha20-Poly1305 on your device before being sent to the server.

3. Server stores blobs

The server stores only encrypted blobs. It has no keys to decrypt them. Your data is safe even in a breach.

Unlike Google Calendar or iCloud

Most productivity tools have full access to your data in plaintext. SilentSuite is fundamentally different.

SilentSuiteGoogleApple iCloud
End-to-end encryptedYesNoPartial
Provider can read your dataNoYesYes
Open sourceYesNoNo
Self-hostableYesNoNo
Data sovereigntyYes (self-host or hosted)NoNo
Data used for advertisingNeverYesNo

Ready to take back your privacy?

Sign up and experience truly private productivity tools today.

Get Started