Privacy Policy
Last updated: April 29, 2026
Encrypt-it is built so that your secrets stay on your devices. We don’t collect your personal data, we don’t profile you, we don’t use analytics, and we don’t embed third-party SDKs. This page explains exactly what happens to your data.
What you store in Encrypt-it
Passwords, logins, secure notes, credit cards, photos, and any other secrets you save are encrypted on your device before they are written to disk. Encryption uses Apple’s CryptoKit framework with AES-256-GCM and a key derived from your password using PBKDF2-HMAC-SHA256. The key that protects your data never leaves your device in plaintext form.
iCloud sync
If you are signed in to iCloud, Encrypt-it uses Apple’s CloudKit to sync your encrypted data between your devices through your private iCloud database. Apple cannot read this data: it leaves your device already encrypted with a key only you possess, and Apple sees only opaque ciphertext. Sync is automatic; if you sign out of iCloud or disable iCloud for Encrypt-it in iOS Settings, sync stops.
Sign in with Apple
Your Encrypt-it account is created and protected by a master password that only you know. Sign in with Apple is offered as an optional convenience — once you turn it on in Settings, you can unlock the app without retyping your master password. It is not used to create your account, and it is not a recovery mechanism: if you forget your master password, Sign in with Apple cannot recover your data.
When you enable it, Apple gives the app an opaque user identifier tied to your Apple ID. We do not receive your real Apple ID, your name, or your email. The identifier is used only to bind a device-local keychain entry that lets the app unlock your existing master key on this device. Sign in with Apple is governed by Apple’s privacy policy.
Sharing a secret
When you share a secret, Encrypt-it generates a random per-share encryption key, encrypts the secret with that key, and uploads only the ciphertext to your iCloud (via CloudKit Sharing). The share link looks like https://encrypt-it.app/s/<id>#<key>. The decryption key lives in the part after the #, which web browsers never send to any server. Our landing page at encrypt-it.app/s/… only passes that fragment to the Encrypt-it app on your device; it is not stored, fetched, or logged. Recipients without the link cannot decrypt the secret.
Purchases
Premium features (key rotation, backup and restore, photo download) are sold through Apple’s App Store using StoreKit. Apple handles payment; Encrypt-it only sees that a purchase was made and stores that fact locally so it can unlock the feature. We never see your payment information.
Diagnostics
Encrypt-it keeps a local activity log on your device for crash diagnostics and to help you recover if something goes wrong. The log lives in the app’s private storage and is never uploaded automatically. If you contact support and choose to share it, you do so explicitly by attaching it to your message.
What we don’t do
- No analytics, telemetry, or usage tracking.
- No advertising or ad identifiers.
- No third-party SDKs. The app is built only on Apple’s frameworks.
- No server controlled by us — we do not run a backend that sees your data.
Children
Encrypt-it is not directed at children under 13 and does not knowingly collect data from them.
Deleting your data
You can delete individual secrets, or wipe everything by deleting your account inside the app or removing the app from your devices. Removing the app deletes its local data; clearing your iCloud data removes the encrypted copies stored there. Because we do not run a server, there is nothing for you to ask us to delete.
Changes
If we update this policy, we will change the date at the top and, for material changes, also note them in the app’s release notes.
Contact
Questions about privacy: encryptit@icloud.com.