What End-to-End Encryption Means in a Clipboard App

"End-to-end encrypted" gets stretched a lot, especially in marketing copy for clipboard and file-sharing apps. The phrase has a precise technical meaning, and most products that claim it don't actually qualify. Here's what the term really requires, where common implementations fall short, and how Clipcroft's optional clipboard password fits the definition.

What "end-to-end encryption" actually requires

The shortest correct definition: only the endpoints can read the content. Not the server. Not the network. Not even the company that runs the service. Three concrete things have to be true:

  1. The encryption key never leaves the endpoints. If the server ever sees, generates, or stores the key, the system is not end-to-end encrypted — it is merely "encrypted in transit" or "encrypted at rest", which are different and weaker properties.
  2. The plaintext never reaches the server. The data has to be encrypted on the sending device before it's transmitted, and decrypted on the receiving device after it arrives. Anything in between, including the server, sees only ciphertext.
  3. The server can't trick the endpoints into giving up the key. This is the subtle one. If the server can swap a key out, hand a malicious key to the receiver, or otherwise sit between the endpoints, the system has a man-in-the-middle weakness even if everything else is correct.

Why most "encrypted" clipboard apps don't qualify

TLS is not end-to-end encryption

The most common bait-and-switch is conflating TLS (the encrypted-in-transit guarantee that protects data between your browser and a server) with end-to-end encryption. Every reputable clipboard app uses TLS — that's just HTTPS. But TLS terminates at the server. Once your data arrives there, it's plaintext. The server (and anyone with access to it) can read everything. TLS protects against eavesdroppers on the network; it does not protect against the service provider.

Server-held keys are not end-to-end encryption

Some products generate an encryption key for you and store it on their servers. The marketing copy will often say "your files are encrypted on our servers" — and that's true, but the key is right next to the ciphertext. Anyone with admin access to the database can decrypt everything. This is encryption-at-rest, which is a useful property (it protects against database leaks), but it's not end-to-end and it does not protect you from the company itself.

Server-generated keys delivered "securely" are not end-to-end encryption

A more sophisticated approach is for the server to generate a key per session and "give" it to both endpoints over an encrypted channel. The intent is good, but the server has held the key, even briefly. Trustworthy E2E systems require that the server never sees the key in any form.

The litmus test: if the company that runs the service could decrypt your data with a court order or a malicious admin, the service is not end-to-end encrypted. Period.

How Clipcroft's optional clipboard password works

Clipcroft's default mode is browser-to-browser via WebRTC, which is a different privacy story (the file never reaches our servers at all). For clipboards where you want the stronger guarantee — that even if WebRTC's signaling layer were compromised, your data would still be opaque to us — you can set a clipboard-level password when creating the clipboard.

Here's what happens, step by step:

  1. You set a password in your browser. The password itself never leaves your device. It's not sent to our servers, not logged, not stored anywhere off your machine.
  2. Your browser derives an encryption key from the password. We use PBKDF2 with a per-clipboard random salt, then AES-GCM as the encryption primitive. The derivation happens in JavaScript using the browser's native SubtleCrypto API.
  3. A second device opens the same clipboard. When that device receives an item, it sees only ciphertext until the user types the same password. Without the password, the data is unreadable.
  4. Encrypted items travel through the network. Whether they go through the WebRTC peer-to-peer path or are relayed via the signaling server, all our infrastructure ever sees is ciphertext.
  5. The receiving browser decrypts in memory. The decrypted content lives only in the browser tab. It's never written to a server.

What we — Clipcroft, the company — can see in that flow:

What we cannot see:

What this protects against — and what it doesn't

Threat-model honesty is part of taking encryption seriously. Here's what an optional clipboard password protects against:

And here's what it does not protect against:

Why we made it optional

The default Clipcroft flow already has a strong privacy property: files never touch our servers thanks to WebRTC peer-to-peer. For most users — sharing photos between their own devices, moving a document from a work laptop to a home PC — that's already plenty.

End-to-end encryption adds a second layer. It's the right choice when:

For everything else, the default is good enough. We made encryption opt-in instead of default because:

How to use it

  1. On the device that creates the clipboard, click Create new clipboard and set a password in the optional field. The password must be at least 6 characters; longer is better.
  2. Share the clipboard link (which contains a one-time verifier token) with the other device. Send the password through a different channel — in person, over an encrypted messenger, or any path you trust.
  3. On the second device, open the link and enter the password. The browser derives the key locally and decrypts the clipboard items.
  4. Both devices can now send and receive encrypted text and files. Anything new that lands on the clipboard is encrypted automatically.

The short version

End-to-end encryption isn't a feature flag — it's a property of who holds the key. If the server can ever see the key, the system isn't E2E. Clipcroft's optional clipboard password is a real E2E layer: the password stays on your device, the key is derived locally, and our servers see only ciphertext, file sizes, and timing. For everyday clipboard sync, the default WebRTC peer-to-peer flow already keeps your files off our servers. For sensitive content, the optional password adds a guarantee even an admin with full database access can't break.

Try a password-protected clipboard. The password never leaves your device.

Open Clipcroft