Keze logoKeze
Login Sign Up
Home Tool Comparisons Security Privacy Agency Email Templates Terms
Security

How Our Zero-Knowledge Architecture Actually Works

Most onboarding tools ask you to "trust them" with your clients' passwords. We do not want your trust; we want to be mathematically incapable of seeing your data.

Here is the exact lifecycle of a Keze request link:

1 True Local Encryption

Before your data ever leaves your device, your browser utilizes the Web Crypto API to generate a single-use, cryptographic key (AES-256-GCM). Your credentials are locked and encrypted locally, right on your screen.

2 The Server Blindfold

When you generate a link, Keze only receives the locked vault (the ciphertext) and an Initialization Vector. We never receive, see, or store the decryption key. Our edge servers are completely blind to the plaintext contents of your payload.

3 Isolated Key Distribution

This is where traditional forms fail. Instead of storing the key in our database, the decryption key is cryptographically bound directly to the unique URL provided to you. Using isolated client-side routing, the key is separated from the network request. This ensures that network logs, email scanners, and even our own database cannot access or intercept the key.

4 Zero-Trace Decryption

When your client clicks the link, their browser requests the locked vault from our server. It is delivered, and the client's browser uses the isolated key from their local URL to decrypt the credentials instantly on their screen.

5 The "Burn After Reading" Protocol

The exact millisecond our server delivers the locked vault to the client, the database record is permanently purged. We do not archive it, we do not soft-delete it, it is gone. If a link-preview bot, a hacker, or anyone else tries to click that link a second later, the data no longer exists.

Platform TRULY Zero-Knowledge?
Keze Yes
Password.link Yes
1Password Yes
Bitwarden Yes
Dashlane Yes
Password Pusher No
NordPass Yes
Keeper Yes
Infisical Yes
Doppler No
Vaulty.tools No
AgencyAccess No
LastPass Yes*

*LastPass' architecture famously left metadata unencrypted, leading to massive exposure during their breach

Keze logoKeze
© 2026 Keze. All rights reserved. · Privacy · Terms · Security

Established Cybersecurity for Agency-Client Transmissions

© 2026 Keze. All rights reserved. · Privacy · Terms · Security

Designed by HessBuilds.co.uk