Our Commitment to Security

Your privacy is paramount. Learn how Summra protects your data.

End-to-End Encryption (E2EE) for Transcription

Summra employs a robust E2EE architecture, ensuring that only your device can decrypt and view data. The server never has access to private decryption keys or plaintext user data.

  • Client-Side Audio Encryption: Audio is encrypted on your device before upload using a random symmetric key (K_audio) with AES-GCM.
  • Secure Key Transmission: K_audio is encrypted with the server's public key (Pub_server) for secure transmission. The server decrypts K_audio using its private key only in a temporary, secure, and isolated environment (e.g., enclave or isolated VM) for transcription.
  • Secure Transcript Return: After transcription, a new symmetric key (K_transcript) is generated. The transcript is encrypted with K_transcript. Then, K_transcript is encrypted with your client device's public key (Pub_device) and sent back with the encrypted transcript.
  • Zero Server Access to Plaintext: The server transcribes audio within a temporary, isolated environment and cannot access plaintext audio or transcripts outside this process. Summra servers never store, access, or derive user secrets. Temporary compute environments are securely destroyed after each use.

Multi-Device E2EE Sync

Access your E2EE transcripts securely across multiple devices. Summra's multi-device architecture is inspired by secure systems like WhatsApp and does not rely on master passwords for syncing.

  • Independent Device Keys: Each device independently generates a long-term E2EE key pair (consisting of a private key Priv_device and a public key Pub_device). The private key is stored locally in a secure enclave or device keystore and never leaves the device. Public keys are shared with the server for routing.
  • Secure Device Linking: A new device generates its key pair. An existing, authenticated device retrieves the new device's public key, encrypts the local transcript vault with it, and sends it. The new device decrypts the vault using its private key.
  • Transcript Sharing: Encrypted transcripts are re-encrypted for each device or shared using a symmetric key securely transmitted during device linking, ensuring each device has independent access.
  • Zero-Trust Server Design: Summra servers never store or see unencrypted content. All pairing, key exchanges, and transcript syncs are cryptographically signed and verified.

Our Core Security Principles

User-Centric Control

You, and only you, control access to your data. Your device's private key (Priv_device) never leaves your device, and our architecture is master-password-free.

Zero Knowledge Architecture

Our servers are designed with a zero-trust model. We cannot access your unencrypted transcripts or private decryption keys. Summra servers never store, access, or derive user secrets.

Robust Encryption Standards

We utilize strong, modern encryption algorithms like AES-GCM for data protection. Audio is encrypted with AES-GCM on the client-side.

Security FAQs

How is my audio data protected during transcription?

Your audio is encrypted on your device using a unique, per-job symmetric key (K_audio) with AES-GCM. This K_audio is then encrypted with the server's public key (Pub_server) for transmission. The server decrypts K_audio using its private key only within a temporary, secure, isolated environment (e.g., enclave or VM) to decrypt the audio and perform transcription. After transcription, a new symmetric key (K_transcript) is generated. The transcript is encrypted with this K_transcript, and then K_transcript itself is encrypted with your device's public key (Pub_device) before being sent back to you. K_audio is ephemeral and not reused for transcript encryption. The temporary compute environment is securely destroyed after use.

What happens if I lose a device?

With Summra's multi-device architecture, you can maintain access to your encrypted transcripts from your other linked devices. You can revoke access for lost or stolen devices. Additionally, you have the option to export your encrypted vault, protected with a strong password you choose, for backup and recovery in case all linked devices are lost.

Does Summra store my device's private key?

No. Summra never stores or has access to your device's private key (Priv_device). Your private key is stored locally on your device, ideally in a secure enclave or device keystore, and never leaves your device. It's used locally to decrypt data intended for that device.

How are new devices added securely?

When adding a new device, it generates its own E2EE key pair (Priv_device_new, Pub_device_new). An existing, authenticated device (e.g., your desktop) authenticates the new device (e.g., via QR code scan) and retrieves its Pub_device_new. The existing device then encrypts your local transcript vault using Pub_device_new and transmits it to the new device. The new device decrypts this vault using its Priv_device_new, gaining access to your transcripts without needing a master password.

Can Summra staff access my transcripts?

No. Due to Summra’s end-to-end encryption and zero-trust server design, our staff cannot access your unencrypted transcripts or your private decryption keys. Only your authenticated devices can decrypt and view your data. Summra servers never store or see unencrypted content, and all temporary compute environments used for transcription are securely destroyed after each use.