Your Data Stays
On Your Machine.
A technical explanation of how TrustArchive protects your trust data, why we cannot access it, and what that means for fiduciary accountability.
Security by Architecture,
Not by Policy
Most software promises to protect your data. TrustArchive is built so that protecting your data requires no promises — it is simply not possible for us to access it.
How Your Data Is Protected at Rest
TrustArchive uses SQLCipher, an open-source extension to SQLite that provides transparent, full-database encryption. Every byte of your data — including metadata, indexes, and free pages — is encrypted before being written to disk.
- AES-256-CBC encryption on the entire database file
- Key derived from your master password via PBKDF2 with 64,000 iterations
- A 256-bit random salt is generated per database — unique to your installation
- Page-level encryption means no partial reads are possible
- Open source — SQLCipher is auditable by anyone
A Cryptographically Defensible Record
Every action in TrustArchive is logged in an immutable hash chain. For fiduciaries, this is not just a convenience — it is the foundation of demonstrating that you have fulfilled your duties to beneficiaries, courts, and co-trustees.
- What is logged: Every user action: logins, document access, journal entries, distributions, rule changes, operator profile changes, and session events.
- How it is sealed: Each log entry is cryptographically chained to the previous one using SHA-256. Altering any entry breaks the chain, making tampering immediately detectable.
- Immutability: Audit entries cannot be deleted or modified through the application interface. Voiding a transaction creates a new entry — the original remains.
- Export: The full audit log can be exported to CSV for court filings, mediations, beneficiary accountings, or compliance review.
The Complete Picture of
What We Can See
For full transparency, here is the exact and complete set of data associated with your account that exists outside your machine.
That is the complete list. We have no access to anything inside your TrustArchive database.
What Stays Local,
What Goes Where
A clear map of every data flow in the TrustArchive system.
- ·All trust data, financial records, and journal entries
- ·Beneficiary names, contact info, and distribution history
- ·All uploaded and generated documents
- ·AI queries, responses, and document embeddings
- ·Master password and database encryption key
- ·Audit trail hash chain
- ·Your email address (Supabase)
- ·Your license key and tier (Supabase)
- ·Hardware activation fingerprint — one-way hash only (Supabase)
- ·Payment method (Stripe — we never see your card details)
- ·Any content from inside your TrustArchive database
- ·AI queries or responses
- ·Document contents
- ·Your master password
Security Disclosure
If you discover a security vulnerability in TrustArchive, please report it responsibly to support@trustarchive.co. We will respond within 48 hours and work with you to address the issue before any public disclosure.
Built for Trustees Who
Take Privacy Seriously
No cloud. No data exposure. No compromises.