Security First
Built from the ground up with privacy and security in mind. Your data stays yours, always.
Zero Knowledge Architecture
File Fortress never sees your files. Our local CLI approach means your data stays on your device, always.
Core Security Features
Multiple layers of protection for your data.
End-to-End Encryption
AES-256 encryption protects your data. All your file metadata is encrypted using industry-standard encryption before any processing. Encryption keys are generated and stored locally on your device.
Local Processing
Your data never leaves your device. Unlike cloud-based solutions, File Fortress processes everything locally. Your files, file names, and directory structures remain completely private.
Zero Knowledge
We can't see your data, even if we wanted to. Our zero-knowledge architecture means we have no access to your file contents, names, or metadata. Your privacy is guaranteed by design.
Remote Storage Encryption
FileFortress supports encrypted remote storage, allowing you to work with cloud files encrypted by RClone, Cryptomator, or other encryption tools. When you scan encrypted remotes, FileFortress automatically decrypts file and folder names so you can search and organize your encrypted files seamlessly.
- RClone Crypt - Standard: Strong cryptographic encryption, fully compatible with RClone
- RClone Crypt - Obfuscate: Light obfuscation for non-sensitive data (NOT secure)
- AES-256-CBC: Custom FileFortress encryption with industry-standard AES-256
Remote encryption is available on Standard tier and higher. Upgrade your subscription to unlock this feature.
You Control Your Local Data Encryption
Your local file index is always encrypted. You choose the method.
Automatic Encryption
DefaultBy default, FileFortress uses automatic, machine-specific encryption. The encryption key is securely bound to your device.
- No password to remember or type
- Seamless and secure for single machine use
- Configuration not easily portable to other devices
Custom Password
PortableYou can provide your own master password during initialization. This password encrypts your entire local configuration.
- Configuration is portable to other devices
- Full control over the encryption key
-
Option to use a
--key-filefor convenience
How We Protect Your Data
Local CLI Application
All file analysis happens on your device using our command-line interface. No file data is ever transmitted to our servers.
Client-Side Encryption
Encryption keys are generated locally and never shared. Only encrypted metadata hashes are processed for duplicate detection and organization.
Minimal Cloud Permissions
We only request read-only metadata access to your cloud storage. We cannot download, modify, or delete your files.
Industry Standards
We use TLS 1.3 for all communications, OAuth 2.0 for secure authentication, and follow OWASP security guidelines.
Technical Security
- AES-256: Military-grade encryption for all data at rest
- TLS 1.3: Latest transport layer security for data in transit
- PBKDF2: Password-based key derivation with salt
- OAuth 2.0: Secure authentication without storing passwords
- SHA-256: Cryptographic hashing for file integrity
Privacy Guarantees
- No File Storage: We never store your actual files
- No Content Access: We cannot read your file contents
- No File Names: We don't see your file or folder names
- No Tracking: We don't track your browsing or usage
- No Third Parties: We don't share data with advertisers
What We Store on Our Servers
Transparency about our minimal data collection.
File Fortress keeps minimal data on our servers - only what's absolutely necessary for account management and subscription limit enforcement.
Your Name and Email Address
Required for account authentication, login, and essential communication.
Device Names
The names you choose when registering devices to your account.
Number of Remote Storage Accounts
A count of connected cloud storage providers (not their names or contents).
Why We Collect This Data
This minimal information allows us to manage your account and ensure you stay within subscription tier limits. That's it - there is no other purpose.
Compliance & Standards
GDPR Compliant
Full compliance with European data protection regulations.
SOC 2 Ready
Following SOC 2 Type II security and availability principles.
ISO 27001
Implementing information security management best practices.
Questions About Security?
We're transparent about our security practices. If you have specific questions about how we protect your data, we're here to help.