End-to-End Encryption Explained
A visual, interactive guide to how E2E encryption works — why it matters, how it compares to HTTPS, and a live demo you can try right now.
What is end-to-end encryption?
Imagine putting a letter in a locked box. Only you and the recipient have the key. The postal service carries the box, but they can never open it. They don't know what's inside. They can't peek. They just deliver it.
That's end-to-end encryption. Your data is encrypted on your devicebefore it goes anywhere. It stays encrypted while it travels through the internet, while it's stored on servers, and until the intended recipient decrypts it on their device. Nobody in between can read it.
No encryption vs. HTTPS vs. end-to-end
The message being sent: Meet me at the coffee shop at 3pm
Data is encrypted on your device. Only the recipient can decrypt it.
How end-to-end encryption works
1.A key is generated
Your device creates a unique cryptographic key. This key exists only on your device — it is never sent to a server.
2.Your data is encrypted
Using the key and a strong algorithm (like AES-256-GCM), your plaintext is transformed into ciphertext — a scrambled string that looks like random characters.
3.Ciphertext travels through the internet
The encrypted data is sent through networks, routers, and servers. Anyone who intercepts it sees only meaningless ciphertext.
4.The server stores ciphertext
The server stores the encrypted blob. It has no key and no way to decrypt it. Even a complete server breach would reveal nothing useful.
5.The recipient decrypts
The recipient receives the key (via a secure link, a shared secret, or a key exchange protocol) and uses it to decrypt the ciphertext back into the original message.
Try it yourself
This demo uses the real Web Crypto API in your browser — the same technology that powers Vaulted. Type a message, encrypt it with AES-256-GCM, and see the ciphertext. Then decrypt it back.
Everything happens in your browser. No data is sent to any server.
Who uses end-to-end encryption?
Messaging
Signal, WhatsApp, iMessage
Messages are encrypted on the sender's phone and decrypted only on the recipient's.
ProtonMail, Tutanota
Emails are encrypted before leaving your device. The email provider cannot read them.
Secret sharing
Vaulted, 1Password sharing
Passwords and API keys are encrypted in the browser. The server stores only ciphertext.
Cloud storage
Tresorit, SpiderOak
Files are encrypted locally before upload. The cloud provider cannot access file contents.
Encryption alone isn't enough
Apps like WhatsApp, Telegram, and Signal use end-to-end encryption — but encrypted messages that persist foreverare still a liability. That password you sent six months ago? It's still sitting in your chat history, on every device in the conversation, searchable and copyable.
Vaulted combines E2E encryption with self-destructing links. Once the recipient views the secret and the view limit is reached, the ciphertext is permanently deleted from the server. The link goes dead. There's no chat history, no message archive, no copy lingering on a server or device.
Read the full Vaulted vs Signal comparison to see why a purpose-built tool beats a messaging app for sharing credentials.
Common misconceptions
Myth: “HTTPS means my data is end-to-end encrypted”
Reality: HTTPS encrypts data between your browser and the server. But the server decrypts it and can read it. E2E encryption means the server never sees plaintext.
Myth: “E2E encryption makes you completely anonymous”
Reality: E2E encryption protects the content of your data, not your identity. Metadata like who communicated, when, and from where may still be visible.
Myth: “Only criminals need end-to-end encryption”
Reality: Privacy is a fundamental right. E2E encryption protects medical records, financial data, business secrets, personal conversations, and journalistic sources.
Myth: “The government can always break encryption”
Reality: Modern encryption like AES-256 is mathematically secure. With current technology, brute-forcing a 256-bit key would take longer than the age of the universe.
How Vaulted uses end-to-end encryption
Vaulted encrypts your secrets in the browser using AES-256-GCM via the Web Crypto API. The encryption key is embedded in the URL fragment (the # part of the link), which is never sent to the server. Our server stores only the encrypted ciphertext — we physically cannot read your data.
Learn more about our encryption process or read the full security details.
Frequently asked questions
Ready to share a secret securely?
Share a secret →