Encryption and Security of Thoughts

Zero-Knowledge Encryption

Sovereignty of your thoughts and feelings


Background


At Neelix.IO we believe in full sovereignty of your thoughts and feelings. Same should be the case with digital collaboration mediums, this is why we developed an option to enable zero-knowledge encryption for your reflections in Neelix. This means no one would be able to read your data even if we were required to share raw data from the servers. Provided you choose a good and secure passphrase, it is prohibitive to attempt hacking your data.


Overview


What happens when end-to-end encryption option is enabled:

  • Data is encrypted with your passphrase BEFORE it is sent to Neelix;
  • Your master passphrase is never communicated , e.g. never leaves your devices;
  • No one can read you data; Only you can read it on your device with your passphrase.
End-to-End Encryption

Technical Implementation


All data in Neelix is encrypted when stored in our backend service. Encryption “at rest” secures the actual data within the database and protects backups. Even if an attacker obtains the storage devices containing your data, they won't be able to understand or decrypt it. Find out more here.


Zero-knowledge encryption of specific Neelix data is a different and an additional (optional) feature we developed for securing your data. The process works as follows:

  • All protected data are encrypted client-side before being sent to the server for create/update operations using a key shared by all members of your private space
  • All protected data are returned encrypted from the server for read options and decrypted client-side using the shared key
  • The server never has access to the plain text of protected data
  • Shared keys encrypted client-side by each consortium member using their own passphrase
  • New users obtain the shared key using client-side public key encryption
  • The server never has access to the plain text of the shared key
  • Your passphrase is never communicated to Neelix or over internet at all


FAQ


What is the significance of encryption passphrase?

The passphrase is used to encrypt the key needed to encrypt and decrypt protected data. It allows users to maintain absolute confidentiality of their data. No one but consortium members - not even Neelix - will be able to read your protected data.


How secure is the encryption passphrase?

The first principle is that your passphrase is never communicated. What you type is only local to your session. No one can decrypt your data provided your local environment is not compromised and you choose strong enough passphrase. Please ensure not to use rogue add-ons in your web browser. You can use security.org to check the strength of your key.


What if I forget the master passphrase?

NB: This procedure works only if you previously invited someone else to join your private consortium

  • Ask to be removed, if there is another user in your private consortium
  • Initiate a new access request
  • Provide a new passphrase when prompted


Do other users in my Consortium have their own passphrase?

Yes. Each user’s passphrase can and should be different. 


What sort of encryption is used by Neelix?

Protected user-generated data and shared keys are encrypted using AES 256. For key exchange between private consortium participants, shared keys are encrypted with RSA 4096. 


What data elements are protected by zero-knowledge encryption

The intent is to encrypt data attributes that may contain sensitive feedback or commentary. Neelix zero-knowledge encryption is applicable to following data elements only:


Record Attribute
Experience post commentary
Comment on experience post commentary
Goals Name
Goals Description
Goals Target Name
Goals Target Description
Linked action name
Time capsule message commentary and future commentary
Retro feedback commentary
Retro feedback comment commentary
Culture profile option reflection question
Culture user feedback commentary

What data elements excluded from zero-knowledge encryption

Data elements considered as metadata are not covered by zero-knowledge encryption:

  • Space name
  • Experience category names
  • Activity names
  • User profile name
  • Quiz configuration data (question names, etc.)


How to Enable Extra Encryption


  • Additional encryption can only be enabled at the consortium creation stage


Important

  • Consortium with extra encryption enabled will not work with Slack or MS Teams integrations
  • The security of the master passphrase and security of your local environment may be your responsibility

Self-reflection

85% of us are either lying to ourselves, in denial or just not seeing ourselves clearly

Happiness

60% of younger people believe I'd be a happier person and physically healthier if I reduced the time I spend on social media

Goals & Resolutions

95% of people confess to at least occasional procrastination

Positive Thinking

 average person has about 12,000 to 60,000 thoughts per day.

85% of what we worry about never happens

"One No, can be worth a thousand of Yes's"


Somebody

“When something goes wrong with a computer, you get an error message. When something goes wrong with a human, you get feelings”


Andrew Tarvin (“The Skill of Humor”)

"I didn’t say I liked it. I said it fascinated me. There is a great difference."


Oscar Wilde

"You must always live in love with something unreachable... a person becomes taller because he reaches up"


Maxim Gorky

“The single biggest problem in communication is the illusion that it has taken place.”


George Bernard Shaw

"The value of an idea has nothing whatsoever to do with the sincerity of the man expressing it"


Oscar Wilde

Share by: