Every other week, some tech company announces they're "zero knowledge." It's become a marketing buzzword, right up there with "military-grade encryption" (which, by the way, just means AES-256 — the same encryption your iPhone uses).
But the concept behind zero knowledge is genuinely important. When a service is truly zero knowledge, it changes the trust equation completely. The problem is that most services claiming to be zero knowledge... aren't.
Zero knowledge means the service provider has zero knowledge of your data. Not "we choose not to look." Not "we have a policy against reading your stuff." It means they cannot read your data, even if they wanted to, even if forced to by a court order, even if hackers break into every server they own.
Think of it like a lockbox analogy:
Here are telltale signs that a service claiming "zero knowledge" probably isn't:
They can reset your password and you keep your data.
This is the #1 giveaway. If a service can reset your password and you still have access to all your files, it means the encryption key isn't derived from your password. Which means they have the key somewhere. Which means they can read your files. A truly zero-knowledge service will warn you that if you lose your password, your data is gone forever — because they can't help you.
They generate previews or thumbnails on the server.
If you upload a photo and the web interface shows a server-generated thumbnail without your browser doing the decryption, the server read your photo to make that thumbnail. Zero knowledge? No.
They offer server-side search across your files.
If you can search the contents of your encrypted documents and the search happens on the server side (not in your browser), the server can read your documents. There are exotic cryptographic techniques that might make this possible while maintaining zero knowledge (homomorphic encryption, encrypted indexes), but they're extremely rare in practice. Most services that offer search are just reading your files.
They scan for illegal content.
This is a touchy subject, but it's technically telling. If a service scans uploaded files for CSAM or copyrighted material (as required by various laws), they can read your files. You can't scan what you can't see. A true zero-knowledge service is in the unusual position of being unable to comply with content scanning requirements — which is legally complex but cryptographically honest.
There are legitimate zero-knowledge services out there. They share some common traits:
Some examples in different categories:
You might think this is academic. It's not. Here's why zero knowledge matters in practice:
Data breaches. In 2024, there were over 3,200 publicly reported data breaches in the US alone. When a zero-knowledge service gets breached, attackers get encrypted blobs — useless without keys they don't have. When a regular service gets breached, everything is exposed.
Insider threats. Most data leaks come from inside the organization. A disgruntled employee at a cloud storage company with database access could browse through your files — unless the service is zero knowledge, in which case they'd see garbage.
Legal demands. Governments can compel companies to hand over data. A zero-knowledge service can comply with the request and hand over encrypted data — which is useless to the requesting party. This isn't about evading law enforcement; it's about ensuring that your private data stays private even when companies are forced to hand it over.
Future-proofing. A company's privacy policy can change. Ownership can change. Laws can change. But math doesn't change. If your files are encrypted with a key the server never had, they're safe regardless of what happens to the company.
Don't trust promises. Trust math. A company that says "we won't look" is making a promise. A company that says "we can't look" is stating a mathematical fact.
If you want to verify whether a service is actually zero knowledge:
Don't take anyone's word for it — including ours. That's kind of the whole point.
SecureTransfer is open source. Read the code, check the network tab, verify for yourself. Or just try sending a file →
© 2025 CleveroAB