← Back to Blog

Is a Free Note-Taking App Really Safe for Sensitive Data? Why VaultBook Gives You Real Privacy and Control

The marketing language of privacy in free productivity software has developed a specific grammar over the past decade, and recognizing its patterns is the first step toward evaluating whether the privacy being promised is genuine or nominal.

The grammar works like this: the application is described as encrypted, the encryption is described as end-to-end, the user’s data is described as private, and the overall impression created is one of a digital safe that only the user can open. The language is specific enough to sound technical and general enough to avoid the commitments that genuine technical specificity would require. “End-to-end encryption” sounds like a complete description of a security architecture; in practice it describes only the transmission layer and says nothing about who holds the keys that govern access to the stored content. “Your data is private” is a policy statement rather than a technical one - it describes the vendor’s current intention rather than the architecture that would make the intention enforceable.

The professionals who most need to evaluate these claims accurately are often least equipped to do so, because the technical gap between the marketing description and the architectural reality is exactly the gap that the marketing is designed to obscure. A healthcare provider who trusts that “end-to-end encrypted” notes in a free application are genuinely private may not know that the vendor holds the encryption keys and can access the decrypted content if compelled by legal process. A lawyer who trusts that a “secure” note application protects privileged communications may not know that the vendor’s servers store those communications in a form accessible to the vendor’s administrators. A financial advisor who trusts that a free application’s privacy mode protects client data may not know that the privacy mode governs the vendor’s use of the data for advertising purposes, not the vendor’s ability to access the data if required.

VaultBook’s response to this language problem is not better marketing language. It is a different architecture. An application that makes no network requests cannot transmit data to any server. An application that stores all data in local files on the user’s device cannot expose that data through a server-side breach. An application that derives encryption keys locally from the user’s password and never stores those keys anywhere cannot have its keys compromised by a vendor’s key management failure. The privacy VaultBook provides does not depend on trusting the vendor’s intentions because the architecture does not give the vendor any role in the data handling that trust would need to govern.

This is the difference between privacy by policy and privacy by architecture. And for professionals whose obligations require certainty rather than trust, it is the only distinction that matters.

The Specific Ways Free Cloud Apps Fail the Privacy Test

To be fair to the applications that the privacy-forward productivity software space has produced, not all free cloud-based note applications handle privacy with equal carelessness. Standard Notes, for example, has made genuine architectural commitments to end-to-end encryption with user-held keys, and its implementation is meaningfully stronger than the mainstream alternatives. Notion and Evernote are less serious about privacy at the architectural level and more honest about it in their terms of service than their marketing language suggests.

But even the most privacy-conscious free cloud applications fail the test that sensitive professional data imposes, and they fail it in ways that are architectural rather than implementation-level - in ways that cannot be fixed by improving the encryption without changing the fundamental design.

The first architectural failure is the account requirement. Every free cloud application requires the user to create an account, which establishes a relationship between the user’s identity and their note-taking activity on the vendor’s infrastructure. Even if the note content is end-to-end encrypted and genuinely unreadable to the vendor, the account metadata is not. The vendor knows that this account exists, when it was created, when it is accessed, from which IP addresses, with what frequency, and for how long each session. For sensitive professional work, this behavioral metadata is itself sensitive. The pattern of when a clinician accesses their notes can reveal information about patient appointment schedules. The pattern of when a lawyer is working intensively on specific account categories can reveal case strategy. The behavioral metadata that cloud accounts necessarily generate is not protected by content encryption.

The second architectural failure is the key management requirement. In applications that offer genuinely user-controlled encryption, the encryption keys must be made available on every device where the user accesses their notes. The mechanism that achieves this - typically, deriving the key from the account password through a function that runs on each device at login - creates a dependency on the account authentication system. If the account authentication system is compromised, if the password is exposed through a phishing attack, or if the account recovery mechanism provides a backdoor to the key derivation, the encryption provides less protection than its technical description suggests. An application where key derivation requires authenticating to a vendor’s server is an application where the vendor’s server is a component of the key management architecture.

The third architectural failure is the conditional privacy. The privacy that a free cloud application provides today is the privacy that the current version of the application, operated by the current management of the current corporate entity, chooses to provide. Application terms of service can be updated. Vendor ownership can change. Regulatory environments can shift in ways that alter what legal process can compel the vendor to produce. The privacy that is promised today is subject to all of these changes, and the user who has built a knowledge base in a free cloud application has built it on a foundation whose privacy properties they cannot control or guarantee over the long term.

None of these failures are addressed by improving the implementation of encryption within the existing architecture. They are properties of the cloud architecture itself, and they persist as long as the cloud architecture persists.

VaultBook’s Architecture: Why Local-First Eliminates These Failures

VaultBook’s architecture eliminates the three failures described above not by solving them but by making the conditions that produce them structurally impossible.

The account requirement failure is eliminated because VaultBook has no accounts. There is no vendor infrastructure to authenticate against, no account metadata to generate, and no relationship between the user’s identity and their vault activity from the vendor’s perspective. The user opens VaultBook by loading the HTML file and connecting to the local folder that contains their vault data. No server is involved in this process, no account is consulted, and no behavioral record is created in any external system.

The key management failure is eliminated because VaultBook’s encryption key derivation happens entirely on the user’s device using the browser’s native cryptographic implementation. The per-entry AES-256-GCM encryption with PBKDF2 key derivation at 100,000 iterations of SHA-256 is performed locally, with a random 16-byte salt and a 12-byte initialization vector generated freshly for each encryption operation. The derived key exists in the browser’s working memory during an active session and is discarded when the session ends. No component of the key derivation process reaches any external server, and there is no account authentication system that is a component of the key management architecture.

The conditional privacy failure is eliminated because VaultBook’s privacy properties are architectural rather than policy-based. The application’s code has no network communication pathway - there is no code in VaultBook that could transmit vault content to any external destination even if such transmission were desired. The privacy that the architecture provides is not a policy commitment that the vendor can change by updating terms of service. It is a technical property of the code that can only be changed by modifying the code itself, which the user can audit and verify independently of the vendor’s representations.

These architectural properties are what make VaultBook’s privacy genuine rather than nominal. They are not claims about the vendor’s intentions or commitments - they are descriptions of what the code does and does not do, which can be verified independently.

The Vault’s Data Structure: Transparency as a Privacy Property

VaultBook stores its data in a folder structure that the user can see, inspect, and understand - a design choice that reflects a principle of transparency that is itself a privacy property.

The vault folder contains a repository JSON file that holds the vault’s organizational state - the pages, their hierarchy, the entry metadata, and the user’s vote and preference data. Entry body content is stored in individual sidecar files in an attachments directory, with each entry’s body in a separate markdown file named by the entry’s identifier. Attached files are stored in the attachments directory alongside the body files, with an index manifest that tracks the relationships between entries and their attachments. For Pro users, per-entry version snapshots are stored in a versions directory with retention governed by the 60-day TTL policy. The license file is stored in the vault folder’s root.

This transparent folder structure is visible through the operating system’s file manager, inspectable through any text editor, and understandable through the JSON and markdown formats that it uses. A user who wants to verify that their vault contains exactly the files they have created, with no additional hidden files, can open the vault folder in their file manager and perform this verification directly. A user who wants to understand how VaultBook represents their data can read the JSON repository file and see the data structure that their organizational choices have produced.

This transparency is the opposite of the opaque cloud database model used by most note applications. In a cloud application, the user’s data exists in a database schema on the vendor’s servers that is accessible only through the vendor’s application interface. The user cannot inspect the raw data to verify its contents, cannot audit the data structure to understand how their information is represented, and cannot verify independently of the vendor’s representations that their data is stored as described. The transparency of VaultBook’s local folder structure eliminates this opacity and provides independent verifiability that cloud applications structurally cannot offer.

The transparent structure also supports the combination of VaultBook’s application-level security with system-level security that the user configures independently. VaultBook’s per-entry AES-256-GCM encryption protects specific entries with cryptographic barriers at the application level. System-level full-disk encryption - FileVault on macOS, BitLocker on Windows, VeraCrypt for cross-platform encrypted containers - protects all data on the device’s storage at the disk level, applying to the vault folder along with every other file on the device. The combination of application-level per-entry encryption and system-level full-disk encryption creates a layered security architecture that addresses different threat scenarios - the per-entry encryption protects specific entries from access by someone who has the device but not the entry password, while the full-disk encryption protects all vault content from access by someone who has the device’s storage media but not the system decryption credential.

Full Feature Depth Without Cloud Dependency

One of the most persistent misconceptions in the privacy-versus-features trade-off that cloud applications have trained users to accept is that robust features require cloud infrastructure. The features that users value most in cloud applications - rich organizational depth, full-text search across large content volumes, intelligent content surfacing, cross-device availability - are presented as inherently cloud-dependent capabilities that local-first applications cannot match.

VaultBook’s feature set demonstrates that this misconception is architectural prejudice rather than technical reality. Every capability that VaultBook provides is implemented locally, using the browser’s JavaScript execution environment and the local file system, without any cloud dependency.

The rich text editor in VaultBook’s note bodies and section bodies provides the complete formatting capability that professional documentation requires: bold, italic, underline, and strikethrough formatting; ordered and unordered lists; headings at six levels from H1 through H6; font family selection; case transformation between upper, lower, title, and sentence formats; text color and highlight color pickers; table creation with a size picker and context menu for row and column operations; code blocks with language labels and syntax display; callout blocks with accent bars, title headers, and body content; links and inline images; and markdown rendering through the marked.js library. This is not a reduced-capability local implementation of a richer cloud editing environment - it is a complete, professional-grade editing environment that operates entirely in the browser’s local execution context.

The attachment system supports every major file format that appears in professional knowledge work: PDFs indexed through pdf.js text extraction and OCR processing for scanned pages, DOCX files with OCR of embedded images, XLSX and XLSM spreadsheets indexed through SheetJS text extraction, PPTX presentations with slide text extraction, ZIP archives indexed for text-like inner files, and Outlook MSG email files parsed for subject, sender, body, and deep indexing of email attachments. The inline OCR capability indexes text embedded in images pasted directly into note bodies. All of this indexing happens locally, using the browser’s processing capabilities, with no file transmitted to any external service.

The organizational model provides nested Pages with drag-and-drop reordering, page icons and color dots, right-click context menus for rename, delete, and move operations; Labels with color-coded pills in the sidebar and filtered views; Sections with their own rich text bodies and attachments; Favorites with a dedicated sidebar panel; and for Pro users, Multi-Tab Views with independent view state per tab and Advanced Filters by file type, date range, and combined filter conditions.

The AI features provide the Sparkle pager carousel with four pages of intelligent content surfacing - Suggestions based on weekday pattern learning, Recently Read with up to one hundred deduped entries and timestamps, Recent Files, and Recent Tools. The Ask a Question interface provides natural language search with weighted relevance scoring across the full vault content. Smart Label Suggestions analyze entry content to suggest relevant labels as pastel chips with occurrence counts. Query Suggestions from History surface past queries as the user types. Typeahead search provides real-time dropdown suggestions as characters are entered. For Pro users, the Related Entries feature surfaces contextually similar entries with vote-based relevance training, and QA Actions add vote-based reranking to search results.

The version history in Pro maintains per-entry snapshots with a 60-day retention period, accessible through a modal interface showing versions from newest to oldest. The built-in tools suite in Pro includes the File Analyzer for CSV and TXT visualization, the Kanban Board that uses labels and inline hashtags to generate project boards automatically, the Reader for RSS and Atom feeds with folder organization, Save URL to Entry for capturing web content as vault notes, Import from Obsidian for migrating markdown files, MP3 Cutter and Joiner for audio editing, File Explorer for browsing attachments by type and entry, Photo and Video Explorer for visual media browsing, Password Generator, Folder Analyzer, PDF Merge and Split, PDF Compress, and the Threads tool for chat-style note entry.

Each of these features operates locally, without any network request, without any cloud service dependency, and without any behavioral data being transmitted to any external infrastructure. The feature depth is genuine and complete. The cloud is not required.

Free Applications and the Hidden Cost of Privacy

The economic logic of free productivity software is worth examining explicitly, because understanding how free applications generate revenue clarifies why their privacy promises are structurally limited regardless of the sincerity with which they are made.

Free applications that offer productivity tools to users at no charge must generate revenue from some source. The major models are advertising - displaying ads within the application and generating revenue based on impressions or clicks - and data monetization - using information about users and their behavior to improve advertising targeting, to build data products, or to generate revenue through data partnerships. Both models create a financial incentive to maximize the data collected about users and to maximize the engagement that generates that data.

This financial incentive is structurally incompatible with the privacy architecture that sensitive professional data requires. An advertising-supported application whose revenue depends on behavioral data has a financial incentive to collect more behavioral data, not less. An application whose business model depends on understanding what users do within the application has a financial incentive to build features that encourage more engagement and to collect the behavioral telemetry that documents that engagement.

The privacy policies and encryption implementations that free applications provide are promises made against this financial incentive - commitments by the organization to not use the data it collects in ways that would compromise the user’s privacy, maintained by organizational discipline rather than by technical architecture. These commitments can be genuine and sincerely maintained. They can also be changed when organizational circumstances change, when the company is acquired, when the business model is revised, or when regulatory requirements shift. The user has no technical mechanism to enforce the commitment; they can only trust the organization’s ongoing good intentions.

VaultBook’s subscription model is designed to align the application’s financial incentives with the user’s privacy interests rather than against them. The subscription revenue comes directly from users who pay for the application’s capability and privacy properties. There is no advertising to serve, no behavioral data to monetize, and no engagement metric that increasing user privacy would harm. The financial incentive of the subscription model is to make the application more capable and more private, because that is what users are paying for.

The subscription also funds features that directly benefit privacy-conscious users: deeper attachment indexing across more file formats, stronger OCR capabilities for scanned documents, more powerful natural language search, better relevance learning through the vote-based system, and expanded organizational and analytical capabilities. Each year’s subscription funds development that makes the privacy-preserving vault more powerful, not development that makes the application more effective at collecting user data.

Who Needs VaultBook and Why the Architecture Matters for Each

The professionals for whom VaultBook’s privacy architecture is not merely preferable but functionally required span a wide range of fields, and the specific privacy requirements of each field clarify why the architectural guarantee matters.

Healthcare professionals whose notes contain protected health information are subject to HIPAA’s technical safeguard requirements, which include access controls and encryption of PHI. The HIPAA requirement is not satisfied by a vendor’s promise to handle PHI responsibly - it requires that covered entities implement appropriate technical controls over the PHI in their possession. VaultBook’s local architecture, its per-entry AES-256-GCM encryption with PBKDF2 key derivation at 100,000 iterations, and its 60-day purge policy for deleted content provide implementable technical controls over PHI that satisfy the HIPAA Security Rule’s technical safeguard requirements in a form that the covered entity can document precisely.

Legal professionals whose notes contain attorney-client privileged communications are subject to confidentiality obligations that arise from both the privilege itself and from professional conduct rules in every jurisdiction. The transmission of privileged communications to a third-party cloud service is a disclosure that may compromise the privilege, regardless of the vendor’s encryption implementation. VaultBook’s zero-transmission architecture ensures that privileged communications never leave the attorney’s own infrastructure.

Financial professionals whose notes contain client financial information are subject to confidentiality obligations under regulatory frameworks that vary by jurisdiction but consistently require that client information be protected from unauthorized disclosure. The cloud vendor’s employees, the legal process that can be served on the vendor, and the security incidents that can compromise the vendor’s infrastructure are all mechanisms of potential unauthorized disclosure that VaultBook’s local architecture eliminates by removing the cloud vendor from the architecture entirely.

Corporate employees whose notes contain proprietary business information, trade secrets, or confidential strategic data are subject to confidentiality obligations under their employment agreements and under the data governance policies that govern their organization’s information. VaultBook’s local architecture ensures that these obligations are met at the technical level - the information does not reach any third-party infrastructure - rather than requiring case-by-case evaluation of whether each use of a cloud application constitutes a policy violation.

For individuals outside these formal professional categories who simply want to maintain a knowledge base that is genuinely theirs - not subject to vendor policy changes, not accessible to vendor employees, not reachable by legal process served on a vendor they have never met - VaultBook provides the architectural foundation for that genuine ownership. The vault is a folder on their device. It is as permanent as their device and as private as they choose to make it through their own device security practices.

The Search That Covers Everything, Privately

The search capability that makes a large vault practically navigable - the full-text search across notes, sections, and all attached file content that turns the vault from a storage system into a knowledge retrieval system - is one of the capabilities that cloud applications most frequently cite as evidence that local-first tools cannot match their capability. Cloud applications can index large volumes of content on powerful servers and return search results quickly; local applications are constrained by the processing capability of the user’s device.

VaultBook’s search architecture addresses this constraint through intelligent local indexing that makes the full vault content searchable from local storage without requiring server-side infrastructure. The typeahead search provides real-time suggestions as the user types, drawing from note titles, body content, labels, attachment names, and attachment content using a locally maintained index. The QA natural language search processes queries against the full indexed content with a weighted relevance scoring system that gives highest weight to title matches, then labels, then inline OCR content, then note body and section text, then attachment names and content.

The attachment text warm-up process pre-loads indexed content for the top twelve search candidates before the user navigates to any of them, ensuring that attachment content is available in search results without requiring the user to open each attachment to see why it matched. The query suggestions from search history surface past queries as the user begins typing, reducing the effort required to repeat useful searches. The smart label suggestions analyze entry content during editing to suggest relevant labels, reducing the cognitive overhead of maintaining consistent labeling across a large vault.

For Pro users, the QA Actions feature adds vote-based reranking that allows the search results to be refined through use over time. Upvoting results that consistently prove to be exactly what was sought trains the relevance model to surface those results higher in future similar queries. Downvoting results that consistently prove irrelevant trains the model to suppress them. Over the course of extended use, this vote-based learning produces a personalized relevance model that reflects the specific ways the individual user relies on their vault content - making the search more useful with use rather than remaining static.

This search capability is comprehensive, locally computed, and completely private. The queries the user enters, the documents that match those queries, and the behavioral patterns of the user’s search activity are all processed on the user’s own device and stored in the user’s own vault data. No search query reaches any external server. No search result requires any external service to compute. The full-text search across hundreds of notes and dozens of attached files of multiple formats operates locally, privately, and without any cloud dependency.

Building a Knowledge Base That Is Permanently Yours

The final argument for VaultBook over free cloud alternatives is not a security argument or a compliance argument but a permanence argument - the argument about what it means to build a knowledge base that belongs to you unconditionally and permanently rather than contingently and conditionally.

A knowledge base built in a free cloud application belongs to you in the practical sense as long as the application exists, as long as your account exists, as long as the application’s terms of service remain compatible with your use, and as long as the application continues to provide access to the data format you have built your knowledge base in. Each of these conditions is subject to change by a party other than you. Applications are discontinued. Accounts are terminated. Terms of service change. Data formats become unsupported when applications change direction.

The professionals who have spent years building knowledge bases in free cloud applications and then experienced one of these termination events know what the contingent ownership of a cloud-stored knowledge base costs when the condition fails. The research accumulated across years of systematic note-taking, the clinical documentation built across a professional career, the case knowledge developed across decades of legal practice - each of these is worth recovering when it can be recovered and lost when it cannot.

A knowledge base built in VaultBook is stored in a folder on hardware you own, in JSON and markdown formats that are readable without any application, and backed up through whatever mechanisms you choose. It is not subject to any vendor’s business decisions, not dependent on any vendor’s continued operation, and not contingent on any external condition that you do not control. The knowledge base is yours in the unconditional sense - it exists wherever your hardware exists, it is readable as long as JSON and markdown remain human-readable, and it persists as long as you choose to preserve it.

This unconditional ownership is what sensitive professional data requires and what free cloud applications structurally cannot provide. VaultBook’s architecture makes it possible, and the full feature depth that VaultBook provides - the organizational depth, the deep attachment indexing, the AI-powered search and suggestions, the version history, the built-in tools suite - makes building that knowledge base a capable and richly supported activity rather than a compromise accepted in exchange for privacy.

Real security is local. Real privacy is architectural. Real ownership is unconditional. VaultBook delivers all three.

Want to build your second brain offline?
Try VaultBook and keep your library searchable and under your control.
Get VaultBook free