FlowCrypt Privacy Policy

Summary

We will never:

sell or otherwise misuse your data
have access to any of your email content details
have access to your Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
, Message Password[Message Password]
One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.
s or Pass Phrase[Pass Phrase]
A long textual string that is difficult to guess or brute force, used to protect the Private Key.
details
have access to your email Access Token[Access Token]
A set of tokens and information needed to access user’s account through their Email Provider. Kept exclusively by Local App within Local Machine.
or email account details
store or have access to your uncensored credit card information

We do:

produce software that offers end-to-end email encryption details
comply with GDPR details
by default, make your your Public Key[Public Key]
Cryptographic information needed in order to encrypt data for someone. It typically contains email address, name and information about how to encrypt messages for a particular recipient.
publicly searchable details
use Stripe (3rd party) to for payment processing

We may:

share your email address with our payment processor, if you are a paying customer details
relay encrypted email through our servers - only when emailing a recipient that does not seem to have any Compatible Software[Compatible Software]
Software from other vendors which follows the OpenPGP standard of asymmetric key encryption. Local App or Private Web App will attempt to find out which recipients use Compatible Software by first searching your Local App Contacts. If no Public Key was found, Local App will perform a lookup on Attester. Recipients are considered as having Compatible Software if Local App or Private Web App has access to recipient’s Public Key.
installed (password protected messages) details

Table of Contents

End-to-end encryption

Regardless of the method of Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
delivery, FlowCrypt is an end-to-end encryption software. That means the Message Content[Message Content]
The actual meaningful information contained inside Encrypted Message, accessible to anyone with corresponding Private Key (with the right Pass Phrase) or corresponding Message Password.
is encrypted in Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
or Private Web App[Private Web App]
Web App that produces or is able to decrypt sensitive Message Content exclusively on Local Machine.
on Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
and then sent to the recipient encrypted. How the Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
is handled by the recipient depends on their setup. The vast majority of compatible software will only decrypt your Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
on the recipient’s Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
. That means neither Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
nor We[We]
FlowCrypt developers, employees, legal entity or server software that is under our direct control.
can access the Message Content[Message Content]
The actual meaningful information contained inside Encrypted Message, accessible to anyone with corresponding Private Key (with the right Pass Phrase) or corresponding Message Password.
in transit or at rest.

Email Access Token

Access Token[Access Token]
A set of tokens and information needed to access user’s account through their Email Provider. Kept exclusively by Local App within Local Machine.
needed to access user’s email. Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
will request this access during setup. The tokens are then exclusively stored in Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
on user’s Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
, no exceptions. Access Token[Access Token]
A set of tokens and information needed to access user’s account through their Email Provider. Kept exclusively by Local App within Local Machine.
is used solely within Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
for user authentication, sending and receiving of Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
s and other related actions that make Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
work smoothly.

We[We]
FlowCrypt developers, employees, legal entity or server software that is under our direct control.
do not have access to your email account or emails, because the Access Token[Access Token]
A set of tokens and information needed to access user’s account through their Email Provider. Kept exclusively by Local App within Local Machine.
is never shared with FlowCrypt Server[FlowCrypt Server]
Our server software, running on Server Hardware.
. The only data We[We]
FlowCrypt developers, employees, legal entity or server software that is under our direct control.
receive this way is your email address and name - all other Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
data is confined to the Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
you installed, which we can’t access.

Message delivery and storage

When you message a recipient who has Compatible Software[Compatible Software]
Software from other vendors which follows the OpenPGP standard of asymmetric key encryption. Local App or Private Web App will attempt to find out which recipients use Compatible Software by first searching your Local App Contacts. If no Public Key was found, Local App will perform a lookup on Attester. Recipients are considered as having Compatible Software if Local App or Private Web App has access to recipient’s Public Key.
, the encrypted message is transferred from your Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
to recipient’s Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
. This includes any attachments. How the encrypted data is transferred and stored and what happens to the Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
is at the sole discretion of respective Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
s. Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
will see who you are messaging, how often, the email subject and related meta information just like they do when you send Plain Text[Plain Text]
Message that has not been encrypted, and may be readable by anyone handling it.
email. The mechanics of sending encrypted email is the same as Plain Text[Plain Text]
Message that has not been encrypted, and may be readable by anyone handling it.
email, except that the message contents are encrypted first, and therefore Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
is not able to read the Message Content[Message Content]
The actual meaningful information contained inside Encrypted Message, accessible to anyone with corresponding Private Key (with the right Pass Phrase) or corresponding Message Password.
.

When any of your recipients do not have Compatible Software[Compatible Software]
Software from other vendors which follows the OpenPGP standard of asymmetric key encryption. Local App or Private Web App will attempt to find out which recipients use Compatible Software by first searching your Local App Contacts. If no Public Key was found, Local App will perform a lookup on Attester. Recipients are considered as having Compatible Software if Local App or Private Web App has access to recipient’s Public Key.
, then Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
or Private Web App[Private Web App]
Web App that produces or is able to decrypt sensitive Message Content exclusively on Local Machine.
will require a Message Password[Message Password]
One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.
to be provided by sender. Anyone who has access to the Message Password[Message Password]
One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.
can open such Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
. The Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
is then sent through Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
s the same way as above. In addition, encrypted Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
will be stored on FlowCrypt Server[FlowCrypt Server]
Our server software, running on Server Hardware.
. This helps recipients without Compatible Software[Compatible Software]
Software from other vendors which follows the OpenPGP standard of asymmetric key encryption. Local App or Private Web App will attempt to find out which recipients use Compatible Software by first searching your Local App Contacts. If no Public Key was found, Local App will perform a lookup on Attester. Recipients are considered as having Compatible Software if Local App or Private Web App has access to recipient’s Public Key.
to open such messages and view their Message Content[Message Content]
The actual meaningful information contained inside Encrypted Message, accessible to anyone with corresponding Private Key (with the right Pass Phrase) or corresponding Message Password.
through the use of Private Web App[Private Web App]
Web App that produces or is able to decrypt sensitive Message Content exclusively on Local Machine.
. When the recipient doesn’t have Compatible Software[Compatible Software]
Software from other vendors which follows the OpenPGP standard of asymmetric key encryption. Local App or Private Web App will attempt to find out which recipients use Compatible Software by first searching your Local App Contacts. If no Public Key was found, Local App will perform a lookup on Attester. Recipients are considered as having Compatible Software if Local App or Private Web App has access to recipient’s Public Key.
and the Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
is relayed through FlowCrypt Server[FlowCrypt Server]
Our server software, running on Server Hardware.
, following information is stored along with it: (a) date and time Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
was sent, (b) size of Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
, (c) the Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
, (d) message expiration time, (e): indication if this is a Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
text or attachment. From the information we store, we cannot deduce which sender sent each Encrypted Message[Encrypted Message]
Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.
, or to whom. Because Message Password[Message Password]
One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.
can be subject to a Brute Force Attack[Brute Force Attack]
A method of unlocking encrypted material without breaking the underlying encryption, by using vast amounts of computational power to guess all possible combinations of a given Pass Phrase or Message Password. This attack method can be combined with other methods such as a dictionary attack (the use of words commonly found in passwords). The success rate of such attack can vary from very high (for simple, short Pass Phrase or Message Password) through very low (for long, complicated, uncommon and hard to guess Pass Phrase or Message Password), all the way to effectively impossible with current technology (for complex, very long, random Pass Phrase or Message Password).
, it is advisable to use a Message Password[Message Password]
One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.
of sufficient strength for your particular use case. By default, messages relayed through FlowCrypt Server[FlowCrypt Server]
Our server software, running on Server Hardware.
this way expire after 3 days (user configurable). All expired messages are deleted from our servers by the time they have been expired for 37 days.

Handling Message Passwords and Pass Phrases

We[We]
FlowCrypt developers, employees, legal entity or server software that is under our direct control.
will never have access to user Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
s, Message Password[Message Password]
One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.
s or Pass Phrase[Pass Phrase]
A long textual string that is difficult to guess or brute force, used to protect the Private Key.
s. Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
is designed to never send such information to the FlowCrypt Server[FlowCrypt Server]
Our server software, running on Server Hardware.
.

Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
, Private Web App[Private Web App]
Web App that produces or is able to decrypt sensitive Message Content exclusively on Local Machine.
or any other FlowCrypt software will not distribute Pass Phrase[Pass Phrase]
A long textual string that is difficult to guess or brute force, used to protect the Private Key.
s or Message Password[Message Password]
One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.
s in any way. Safe storage, backup and distribution of this material is left solely up to the user.

If any user intentionally or unintentionally sends a Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
, Message Password[Message Password]
One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.
or Pass Phrase[Pass Phrase]
A long textual string that is difficult to guess or brute force, used to protect the Private Key.
to us (please do not do that!), we will delete such information immediately upon noticing it, unless the user explicitly indicated that this material is solely for testing purposes. In either case, users should consider such keys not trusted and compromised, and should avoid using them in production scenarios.

Handling of Private Keys

Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
will store Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
s in storage accessible only to Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
such as browser storage, application storage, hard drive or similar, and the security of these Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
s depend on the security of the underlying Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
that stores them. For this reason, it is advised to always update to latest operating system, keep up to date with latest security fixes, keep the system virus free, use full-disk encryption or any other practices that make Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
less vulnerable to attackers. Additionally, we recommend that you select an option to “Always require a pass phrase when opening email” as an additional layer of security in case your Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
gets compromised in the future through physical or other means.

In addition to storing the Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
in Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
exclusive to Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
, depending on how was Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
set up, following will apply:

When importing Private Key from elsewhere

Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
will keep both the Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
and Pass Phrase[Pass Phrase]
A long textual string that is difficult to guess or brute force, used to protect the Private Key.
exclusively on Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
, unless user specifically navigates to backup Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
section of settings where they perform an additional form of Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
backup.

When creating a new Private Key

Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
will provide the user with a comprehensive estimation of the strength of their Pass Phrase[Pass Phrase]
A long textual string that is difficult to guess or brute force, used to protect the Private Key.
. Once the user chooses a Pass Phrase[Pass Phrase]
A long textual string that is difficult to guess or brute force, used to protect the Private Key.
of satisfactory strength depending on their use case, Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
will store the Pass Phrase[Pass Phrase]
A long textual string that is difficult to guess or brute force, used to protect the Private Key.
and the Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
on Local Machine[Local Machine]
Hardware used by end users such as: a computer, laptop, tablet or a smartphone.
.

In addition, as a part of the setup procedure, Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
will by default backup the encrypted Private Key[Private Key]
Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.
with your Email Provider[Email Provider]
A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.
. To choose your own backup method, click “Show Advanced Settings” during setup.

Personal information

We will not sell, share or otherwise abuse your personal information.

To be able to fulfill our services, we may need to share user’s email address and name with a 3rd party, such as a payment processor for premium accounts.

Email address and name is also enclosed within your Public Key[Public Key]
Cryptographic information needed in order to encrypt data for someone. It typically contains email address, name and information about how to encrypt messages for a particular recipient.
, which is made searchable by your email address on Attester[Attester]
Our Server Software necessary to make encrypted PGP communication smooth. Attester helps store and distribute and verify Public Keys. Attester runs on Server Hardware.
.

Public Key Handling

Public key contains your email address, name, and information about how to encrypt messages for you. Distribution public keys is necessary to make end-to-end encryption work. When others encrypt messages for you, their Local App[Local App]
FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.
will retrieve relevant Public Key[Public Key]
Cryptographic information needed in order to encrypt data for someone. It typically contains email address, name and information about how to encrypt messages for a particular recipient.
from Attester[Attester]
Our Server Software necessary to make encrypted PGP communication smooth. Attester helps store and distribute and verify Public Keys. Attester runs on Server Hardware.
based on your email address.

While Attester[Attester]
Our Server Software necessary to make encrypted PGP communication smooth. Attester helps store and distribute and verify Public Keys. Attester runs on Server Hardware.
does allow searching of Public Key[Public Key]
Cryptographic information needed in order to encrypt data for someone. It typically contains email address, name and information about how to encrypt messages for a particular recipient.
s based on email addresses, it does not allow listing or bulk export of public keys. This way our Public Key[Public Key]
Cryptographic information needed in order to encrypt data for someone. It typically contains email address, name and information about how to encrypt messages for a particular recipient.
database cannot be harvested for spam, unlike other keyservers.

If you want to prevent your Public Key[Public Key]
Cryptographic information needed in order to encrypt data for someone. It typically contains email address, name and information about how to encrypt messages for a particular recipient.
from being publicly available (and instead want to manually distribute it to your contancts, or do not wish to use encryption anymore), see Dismiss recorded Public Key.

GDPR

We, as well as all of our suppliers, are complying with GDPR regulations for all users globally.

You can utilize our software to meet your own GDPR compliance goals, as end-to-end encryption helps guard your sensitive data, and helps reduce exposure in case of a data breach.

All of our servers are located within the EU.

Terminology

We: FlowCrypt developers, employees, legal entity or server software that is under our direct control.

You: The user of this software bound by its licence and terms of use.

Server Hardware: 3rd party server infrastructure provided as a service to Us. This may include cloud servers and related services.

FlowCrypt Server: Our server software, running on Server Hardware.

Attester: Our Server Software necessary to make encrypted PGP communication smooth. Attester helps store and distribute and verify Public Keys. Attester runs on Server Hardware.

Public Key: Cryptographic information needed in order to encrypt data for someone. It typically contains email address, name and information about how to encrypt messages for a particular recipient.

Private Key: Cryptographic information needed in order to open or decrypt previously encrypted data for its corresponding Public Key. Private Key is additionally protected with a Pass Phrase.

Pass Phrase: A long textual string that is difficult to guess or brute force, used to protect the Private Key.

Brute Force Attack: A method of unlocking encrypted material without breaking the underlying encryption, by using vast amounts of computational power to guess all possible combinations of a given Pass Phrase or Message Password. This attack method can be combined with other methods such as a dictionary attack (the use of words commonly found in passwords). The success rate of such attack can vary from very high (for simple, short Pass Phrase or Message Password) through very low (for long, complicated, uncommon and hard to guess Pass Phrase or Message Password), all the way to effectively impossible with current technology (for complex, very long, random Pass Phrase or Message Password).

Local Machine: Hardware used by end users such as: a computer, laptop, tablet or a smartphone.

Local App: FlowCrypt software that runs on Local Machine. This may take a form of an extension, plugin, add-on or a native application.

Local App Contacts: Collection of contacts who use encryption, their Public Keys and related info stored in Local App.

Web App: FlowCrypt software which is served on the web through a link.

Private Web App: Web App that produces or is able to decrypt sensitive Message Content exclusively on Local Machine.

Email Provider: A company, person or their software who ensures delivery of your email. This could be Google, Yahoo, Microsoft, other public email provider, or a private email server.

Access Token: A set of tokens and information needed to access user’s account through their Email Provider. Kept exclusively by Local App within Local Machine.

Compatible Software: Software from other vendors which follows the OpenPGP standard of asymmetric key encryption. Local App or Private Web App will attempt to find out which recipients use Compatible Software by first searching your Local App Contacts. If no Public Key was found, Local App will perform a lookup on Attester. Recipients are considered as having Compatible Software if Local App or Private Web App has access to recipient’s Public Key.

Plain Text: Message that has not been encrypted, and may be readable by anyone handling it.

Encrypted Message: Encrypted text data that may or may not include encrypted attachments. Typically in the format of an email with certain parts of the email encrypted.

Message Password: One-time password used to encrypt Encrypted Message when recipient doesn’t have Compatible Software.

Message Content: The actual meaningful information contained inside Encrypted Message, accessible to anyone with corresponding Private Key (with the right Pass Phrase) or corresponding Message Password.

Feedback

This privacy policy is subject to change without prior notice based on feedback from the community. Such changes and prior versions will be visible on project’s public repository and also mentioned in project’s changelog if/when such changes occur.

Please send us your feedback or requests for clarification at human@flowcrypt.com