Encryption and Security Measures

The Rednote server implements the following security measures to protect your submitted Auto or Manual Rednote consignments:

  • Embed Consignment Instructions: Your consignment instructions are securely embedded into the associated video files.
  • Data Packetization: The video files are split into smaller, manageable data packets.
  • Advanced Encryption: Each data packet is encrypted using industry-standard encryption protocols.
  • Distributed Cloud Storage: The encrypted data packets are stored across multiple, randomly distributed, secure cloud storage locations.
  • Recipient Notification: Recipients are promptly notified that a Rednote consignment has been created for them.

Rednote ensures the highest level of privacy and security for your consigned videos. From the moment a consignment is created until its final delivery, no human, including Rednote staff, can access or view the video files or consignment contents.

This protection is enforced through multiple layers of encryption, secure storage, and access control protocols:

  1. End-to-End Encryption: All video files are encrypted immediately upon consignment. Without the correct decryption keys, the data remains completely unreadable.
  2. Fragmented Storage: Encrypted video packets are split and distributed across multiple secure cloud storage locations, ensuring no single access point exists.
  3. Access-Triggered Delivery: Only when a delivery request is verified and confirmed according to the user’s pre-set triggers and verification conditions will the system automatically reassemble and decrypt the video files for recipient access.
  4. Zero Human Oversight: The entire consignment process is automated. Neither Rednote staff nor any third party can override the encryption or access the content without fulfillment of the designated conditions.
  5. Recipient-Only Access: Once the delivery request is validated, the intended recipients receive a secure link to access the consignment.

This strict privacy framework ensures that your messages remain confidential and under your complete control, providing peace of mind that your private moments stay private until the time is right.

To help Rednote users understand encryption, here’s a sample of an encrypted file.

When you open an encrypted video file in a text editor like Notepad, it appears as random, unreadable characters because the original video data has been transformed into ciphertext using an encryption algorithm.

Here’s why it cannot be converted back to a usable video without the decryption key:

Encryption Process:

  • The video file is processed through an encryption algorithm, which scrambles the data based on a unique cryptographic key.
  • The output is a stream of seemingly random characters, with no recognizable patterns.


Decryption Requirement:

  • To convert the encrypted data back into the original video, the exact encryption key used during the encryption process is required.
  • Without this key, even if someone has access to the encrypted file, it remains indecipherable.


Key Importance:

  • The encryption key acts like a password. Without it, the system cannot reverse the encryption process.
  • Even advanced computing power cannot realistically reconstruct the original video without the key due to the complexity of modern encryption algorithms.

Integrity and Security:

  • The encryption process also ensures data integrity. If the encrypted file is tampered with, the decryption process will fail, further safeguarding the video from unauthorized access.
  • In essence, while you can view the encrypted file as meaningless text in Notepad, it’s entirely useless without the correct decryption key, making it a highly effective security measure for protecting sensitive content.

 

Here’s why opening or reconstructing these files is infeasible:

  1. Encryption at the Packet Level:
    Each video packet is individually encrypted using strong cryptographic algorithms. Without the original encryption key, any attempt to open these packets only reveals random, unreadable characters.

  2. Fragmentation Increases with Video Size:
    Larger video files are divided into even more packets. This exponential increase in the number of encrypted segments makes it even harder to identify, reconstruct, or decrypt the original video without access to all packets and the decryption key.

  3. Randomized, Distributed Cloud Storage:
    The encrypted packets are stored across multiple, randomly distributed cloud storage locations. There is no central repository where the entire video exists, preventing any unauthorized party from gathering the complete set of packets.

  4. Key-Dependent Reconstruction:
    Even if someone managed to collect all the distributed packets, decrypting them without the original key is computationally infeasible. The encryption ensures that the data remains indecipherable without the precise decryption parameters.