Zeerga uses zero-knowledge end-to-end encryption — your files are encrypted on your device before they leave, with keys only you control. We can't read your data even if we wanted to.
Three layers of protection — designed so no one (including us) can access your data without your password.
Your files are encrypted with AES-256-GCM on your device before any byte leaves. The encryption key is derived from your password using Argon2id (memory-hard, resistant to GPU brute force).
Already-encrypted data travels over TLS 1.3 with perfect forward secrecy. Even if someone records your traffic and steals our private key tomorrow, past sessions stay safe.
When you share a file, your file-key is encrypted with the recipient's RSA-4096 public key. Only they can decrypt and read it. Revoke at any time — old links stop working immediately.
File contents
Encrypted before upload. Always.
File names & folder structure
Stored as opaque encrypted blobs server-side.
Your password
Never transmitted, never stored. We see only Argon2 hashes.
Encryption keys
Derived locally. Never leave your device.
Important trade-off: Because we don't have your encryption keys, we cannot recover your account if you lose your password. Set up a recovery phrase in your account settings — it's the only way back in.
Designed and operated with widely-recognized security frameworks in mind.
Information security management practices follow ISO 27001 controls.
Engineered around the trust services criteria: security, availability, confidentiality.
EU data protection compliant. Data Processing Agreement on request.
AES-256 + RSA-4096 — keys never leave your device.
Found a security issue? We want to hear about it. We work with security researchers in good faith — report responsibly and we'll respond within 48 hours, credit you in our Hall of Fame, and send a thank-you package.
Our scope, safe-harbor terms, and submission guidelines are in /.well-known/security.txt.
security@zeerga.com
Zero-knowledge architecture means the burden of trust is moved off our servers. Even if we wanted to read your files, the keys aren't on our side.
Continuous monitoring
Production infrastructure is monitored 24/7 for anomalies; access is logged and reviewed.
Encrypted by default
Every file, filename, and folder structure is encrypted client-side before upload.
Least-privilege access
Internal staff have no access to user data. Administrative actions require multi-party review.
Open to research
Our cryptographic protocols are documented. Independent review summaries are available on request.