How PDF Pro's privacy claims actually work.
Everything on this page is verifiable in your browser's DevTools. The core rule: we should not be able to access your files — even if we wanted to. Below is how that rule is enforced at the crypto, storage, and request layer.
Four architectural pillars
Four technical choices define the security posture. They're enforced by the code that runs in your browser — not by a policy document.
Encryption flow (Secure Transfer)
A byte-by-byte walkthrough of what happens when you drop a PDF into Secure Transfer and share the resulting link. Every step below runs in the browser except the storage of ciphertext.
The security guarantee is load-bearing on step 5 (sender) and step 1 (recipient): the URL fragment after # is not transmitted to the server by any compliant browser. This is what makes the link itself the decryption credential.
Passphrase mode replaces step 1 (sender) with PBKDF2-SHA256(passphrase, salt, 310_000). The salt is stored server-side; the passphrase is shared with the recipient out-of-band.
Signing flow (ECDSA P-256)
PDF signing uses ECDSA over the NIST P-256 curve. The private key is generated in your browser; the document never leaves your device.
crypto.subtle.generateKey in your browser. The private key is exported to a password-wrapped JSON Web Key (JWK) that you can store locally.AI features — where we're honest about the boundary
AI Chat, AI Summary, and Translate need readable text. Here's exactly what leaves your device, and what doesn't.
Threat model — what we defend against, what we can't
Being clear about the threat model is more useful than marketing. Here's what the architecture actually stops, and where it stops.
shieldWhat the architecture defends against
- PDF Pro staff reading your files on our servers (we never hold the key).
- Database-level breach of the transfer store (attacker sees ciphertext, not files).
- Court-ordered disclosure of file contents (we can hand over ciphertext — which is all we have).
- Mail-server retention of sensitive attachments (nothing ever hits your mail server).
- Tampering with a signed PDF (ECDSA signature verification detects any byte change).
warningWhat no browser-based tool can defend against
- A compromised endpoint (malware on your device) — keys live in memory on a device that must be trustworthy.
- Someone shoulder-surfing the URL fragment — treat the share link like the file itself.
- A weak passphrase in passphrase mode — PBKDF2 slows brute force but does not make a 6-character passphrase safe.
- Recipient forwarding a decrypted file — transport security ends when the recipient saves the PDF.
- Compromise of the browser itself or a malicious extension injecting into the page.
No "unhackable" claims. End-to-end encryption raises the cost of a breach significantly — it does not eliminate all risk, especially at the endpoint. For the most sensitive cases, combine Secure Transfer with a separate passphrase and a trusted-channel key exchange.
Related reading
Frequently asked questions
Can PDF Pro decrypt my files?
What exactly runs locally vs on the server?
What algorithms does PDF Pro use?
Is this a legally binding electronic signature?
What happens if I forget a passphrase or lose a share link?
Do you keep server-side logs of file activity?
Can a court order force you to reveal my files?
Where can I verify the cryptographic claims myself?
Privacy as architecture, not marketing.
Try a Secure Transfer and inspect the Network tab yourself. No files are ever uploaded in plaintext.
lockTry Secure Transfer