Flowvault FAQ
Questions we get (or expect to get) about our zero-knowledge encrypted notepad, the dead-man's switch, drand-backed time-locked notes, and how Flowvault compares to ProtectedText, Standard Notes, CryptPad, and other alternatives. If yours isn't here, open an issue on GitHub.
About Flowvault
What is Flowvault?+
flowvault.flowdesk.tech/s/my-notes, set a password, and write. Your notes are encrypted in your browser before they reach our server, so we only ever see an opaque ciphertext blob.Do I need to create an account?+
How much does it cost?+
Comparisons: Flowvault vs ProtectedText, Standard Notes, CryptPad, Privnote, and other encrypted notepads
I already use ProtectedText. Why switch?+
- No legacy plaintext-password blob. Inspect
protectedtext.com/js/main.js— every save still uploads a parallelencryptedContentLegacyblob keyed only by the raw password (for backwards compatibility with older clients). If their database is ever stolen, attackers can crack that legacy blob without doing any Argon2 work at all. Flowvault has no such fallback — every blob requires the full Argon2 chain. - Authenticated encryption. Flowvault uses AES-256-GCM, which detects any tampering with the ciphertext. ProtectedText uses AES-256-CBC via the legacy CryptoJS library, which is malleable: bitflips in the blob go undetected.
- Plausible deniability via hidden volumes.One Flowvault URL can hold multiple independent notebooks, each behind a different password, all packed into one fixed-size blob. ProtectedText is one password, one blob — no decoy possible without a breaking format change.
- Open backend.ProtectedText publishes its client JS for inspection but their FAQ explicitly says the server code is closed. Flowvault publishes the frontend, the Cloud Functions, and the Firestore security rules — the entire stack is reviewable, licensed, and self-hostable.
What we're NOT claiming:ProtectedText today actually does use Argon2id (32 MiB, adaptive ~300 ms) for the primary blob — it's a real KDF, in the same family as ours (64 MiB, 3 iters, HKDF expansion). The KDF gap is small. The legacy-blob issue, the malleable cipher, and the lack of deniability are the real differences.
What is "plausible deniability" in practice?+
Is ProtectedText insecure?+
How does Flowvault compare to Standard Notes?+
Flowvault has a different shape: no account, no email, no app install, no subscription. You type a URL, set a password, and start writing in a browser tab. It's closer to ProtectedText than to Standard Notes in spirit. We add hidden volumes and a fully open backend on top. Pick Standard Notes if you want a long-term encrypted journal across devices; pick Flowvault if you want a no-account scratchpad with deniability.
How does Flowvault compare to CryptPad?+
Flowvault is much smaller in scope (plain text, single pane, one URL = one vault). If you want a Google Docs replacement, use CryptPad. If you want a hidden, deniable scratchpad you can open from any browser without signing in, use Flowvault.
How does Flowvault compare to Privnote, OneTimeSecret, PrivateBin, and other burn-after-reading services?+
- For the persistent side (the notepad you return to for years), Flowvault uniquely offers plausible-deniability hidden volumes: multiple passwords on the same URL unlock different notebooks. Privnote, OneTimeSecret, PrivateBin, and Yopass don't do persistence at all.
- For the one-shot side (a password for a colleague, a recovery phrase, an API key), Encrypted Send is Flowvault's direct answer. AES-256-GCM in the browser, key in the URL fragment, server-enforced view cap (default 1) with atomic hard-delete, optional Argon2id password gate on top, expiry up to 30 days, and the whole stack is open source end-to-end (frontend + Cloud Functions + Firestore rules). See the full comparison table on the homepage.
The short version: use Privnote/OneTimeSecret if you're already there, use /send/new if you want an account-less, open-source alternative that lives next to your long-lived vault.
How does Flowvault compare to Joplin and Obsidian?+
They're a different category from Flowvault. Flowvault is designed for the case where you can't install software (a friend's laptop, a school computer, a hotel kiosk, a phone you don't own), or where you want plausible deniability rather than local-disk encryption. The ideal setup is probably both: Obsidian or Joplin at home, Flowvault for everywhere else.
How does Flowvault compare to Notesnook?+
Flowvault is account-less and browser-only. We don't compete on app polish or device sync — we compete on zero metadata(we don't even know who you are) and hidden-volume deniability. If you want an encrypted note app, Notesnook is great. If you want an encrypted note URLwith deniability, that's us.
I used Skiff Notes. Where should I go now?+
How does Flowvault compare to Bitwarden Send / Bitwarden Notes / 1Password Secure Notes / 1Password Share?+
- Bitwarden Send / 1Password Share (ephemeral one-off shares). Flowvault now ships Encrypted Send, which plays in this exact lane — and unlike Bitwarden Send / 1Password Share, it doesn't require an account on the sender'sside and the entire stack (frontend, Cloud Functions, Firestore rules) is open source in a single repo. Password gate, URL-fragment key, atomic server-enforced view cap — same threat-model promises.
- Bitwarden Notes / 1Password Secure Notes (persistent notes inside a password manager). Flowvault is for free-form text you want to keep coming back to, without an account, without installing anything, and with the option to hide some of it behind a decoy password. Use both: structured credentials in your password manager, free-form scratch + deniable notebooks in Flowvault.
How does Flowvault compare to Cryptee, Turtl, HedgeDoc, dontpad, Etherpad?+
- Cryptee: Estonia-based, encrypted notes and photos, account required. Beautiful but a different shape than a no-login notepad.
- Turtl: open-source encrypted notes app with account-based sync. Closer to Standard Notes than to ProtectedText.
- HedgeDoc (formerly CodiMD, fork of HackMD): collaborative Markdown editor. Excellent for shared drafts but generally not encrypted at rest unless you self-host with care.
- dontpad, Etherpad, pad.riseup.net: collaborative pads, notencrypted — the operator can read your content. Useful for non-sensitive coordination, not for secrets.
If your top requirement is “an encrypted notepad I can open in a browser without signing in,” the realistic field is essentially Flowvault and ProtectedText. Everything else is a different category.
Security
What does the server actually see?+
Is my password ever transmitted?+
Why Argon2id instead of PBKDF2 or SHA-512?+
What if you get hacked?+
Can you be compelled to hand over my notes?+
Is the frontend code verifiable?+
Dead-man's switch & time-locked notes
What is the dead-man's switch?+
released, and the beneficiary can then visit the URL, enter their password, unwrap the master key, and read the notebook.Is the dead-man's switch zero-knowledge too?+
Can someone else fake a heartbeat to keep my vault alive forever?+
Can I cancel a dead-man's switch?+
What happens to my other hidden notebooks when the switch fires?+
Do Standard Notes / ProtectedText / Privnote have a dead-man's switch?+
Time-locked notes — are those the same as the dead-man's switch?+
How do time-locked notes work?+
You compose a message and pick an unlock moment. Your browser:
- computes the drand round number whose signature will be published closest to your unlock moment (30-second granularity);
- encrypts your plaintext to that round using tlock— identity-based encryption over BLS12-381, with the round number as the identity;
- uploads only the opaque ciphertext, the target round, and the drand chain hash to a write-once timelocks Firestore collection.
We hand you back a share link like flowvault.flowdesk.tech/t/xyz. Visit it any time: before the unlock moment you see a countdown, after it your browser grabs the drand round signature and decrypts locally. Flowvault cannot unlock it early — the key literally doesn't exist yet.
Who / what is drand?+
Can Flowvault or law enforcement decrypt a time-locked note early?+
What are the limits and leaks of time-locked notes?+
Can I require a password in addition to the time-lock?+
How is a time-locked note different from Privnote or other burn-after-reading links?+
What is Encrypted Send?+
How does Encrypted Send protect the note?+
Four layers:
- Your browser generates a random 256-bit AES key and encrypts the plaintext with AES-256-GCM (authenticated encryption, so tampering is detectable).
- The key is placed in the URL fragment (after
#). Browsers never send URL fragments to servers, so our database sees only the opaque ciphertext — we have no way to decrypt it. - Optionally, you can add a password. The plaintext is then wrapped in an innerAES-GCM layer keyed by Argon2id(password) before the outer AES wrap. Same “FVPW” frame we use for time-locks.
- The server enforces the view counter atomically through a Cloud Function: reads go through
readSend, which decrements the counter in a transaction and deletes the document the moment the last view is consumed. Firestore rules deny direct reads by clients — that’s what makes the counter trustworthy.
How is Encrypted Send different from Bitwarden Send, Privnote, or 1Password’s share link?+
- Bitwarden Sendis excellent and also zero-knowledge, but it’s gated behind a Bitwarden account (for the sender) and closed server code for the receive path. Flowvault’s equivalent is account-less and open source end-to-end — frontend, Cloud Functions, and Firestore rules all live in the same repo.
- Privnote is account-less too, but closed-source; you take its claims on trust. It also lacks an optional password gate, so a leaked link is game over.
- 1Password Sharerequires a 1Password account for the sender and shares through 1Password’s infrastructure. Fine if you already live there.
- Flowvault Encrypted Send: no account, open source, optional password gate using the same Argon2id + AES-GCM construction as the rest of the product, hard-delete on last view, Firestore TTL as a belt-and-suspenders sweep, and it lives next to your vault and time-locks under one URL.
Could Flowvault read my Encrypted Send note if you wanted to?+
src/lib/send/crypto.ts and src/lib/crypto/passwordFrame.ts, the Cloud Function is in functions/src/index.ts, and the rules are in firestore.rules.What if someone intercepts the link before the recipient opens it?+
Does Encrypted Send support files or just text?+
What happens when an Encrypted Send note expires?+
sendsSweep) batch-deletes any send past its expiresAttimestamp, and a Firestore TTL policy on the same field provides a secondary sweep. Whichever runs first wins; both are idempotent. Once the document is gone, even if someone saved the URL they see “not found” — Flowvault has no backup of deleted sends.Using Flowvault
I forgot my password. Can I recover my notes?+
Can two people share a vault?+
How big can a notebook be?+
Can I use Flowvault offline?+
Can I add a decoy password to an existing vault?+
What happens if two passwords collide on the same slot?+
1/64(~1.6%). For three passwords it's ~4.7%; for five, ~14%. On collision one notebook overwrites the other — we cannot detect collisions across passwords without storing metadata that would break deniability. The one case we docatch: Flowvault refuses to register a new password whose slot would overwrite the notebook you currently have open. If collisions matter for your threat model, just pick a different password and try again.Project
Who builds Flowvault?+
Is Flowvault open source? How does that compare to ProtectedText?+
- Frontend (Next.js, all UI + client-side crypto)
- Cloud Functions(dead-man's-switch sweep). You can read exactly what server-side code runs on your behalf — there is no hidden server process.
- Firestore security rules(the actual boundary that keeps us from reading your data). These are short, auditable, and enforced by Google's infrastructure.
You can self-host the entire stack: bring your own Firebase project, deploy the rules and Functions, point the frontend at it. A permissive license (MIT planned) lets you fork it freely.
For comparison: ProtectedTextpublishes its client-side JavaScript so you can read it in the browser (commendable, and they encourage it), but their FAQ explicitly states “we haven't opened the server code for now.” They argue the server is irrelevant because all crypto happens in the client — which is a fair argument, but you still can't self-host their service or audit what their server does with your encrypted blobs (rate-limiting, logging, retention). Flowvault's answer is to put the server code, the database rules, and the deployment config in the same repo, so there is nothing to take on faith.
How is Flowvault funded?+
I want to support Flowvault. What helps?+
Not in a position to donate? Use Flowvault, tell someone who needs it, star the GitHub repo, file a bug, or submit a PR. All of those matter just as much.