Usalama wa Zero-Knowledge
Nenosiri lako HALITOKA kamwe kwenye kifaa chako. Tunatumia cryptography ya akili kuthibitisha wewe bila kamwe kuona nenosiri lako - njia salama zaidi ya kulinda akaunti yako.
Zero-Knowledge ni Nini?
Unapoingia kwenye tovuti nyingi, nenosiri lako linatembea kwenye mtandao hadi kwenye seva. Ingawa limefichwa wakati wa kusafiri, seva bado inaona nenosiri lako.
Kwa Zero-Knowledge, nenosiri lako linabaki kwenye KIFAA CHAKO. Badala yake, tunatumia hesabu ya akili kuthibitisha unajua nenosiri bila kamwe kulitumai.
Kuingia Kawaida
Unawonyesha kitambulisho chako kuingia kwenye jengo
Kuingia kwa Zero-Knowledge
Unathibitisha unajua mkono wa siri, lakini kamwe hujifunua ni nini
Kwa Nini Kutumia Zero-Knowledge?
Nenosiri Halitawasilishwa Kamwe
Hata kama wahacker wangeangalia muunganisho wako wa mtandao, hawawezi kuiba nenosiri lako kwa sababu halisafiri kwenye mtandao.
Hatuwezi Kuliona
Hata wafanyakazi wa anonym.legal hawawezi kuona nenosiri lako. Taarifa zako zinabaki kuwa za faragha kabisa.
Ulinzi Bora
Ikiwa seva zetu zingeweza kuathiriwa, nenosiri lako bado litakuwa salama. Tunahifadhi tu uthibitisho wa kihesabu, si nenosiri.
Urejelezi wa Maneno 24
Unapata maneno maalum ya urejelezi ili kupata upya ufikiaji ikiwa unakosa nenosiri lako. Hakuna kupiga simu kwa msaada - unadhibiti akaunti yako.
Inafanya Kazi Vipi
Uthibitishaji wa Zero-Knowledge katika hatua 4 rahisi
Unda Nenosiri
Unaunda nenosiri kwenye kifaa chako
Unda Funguo la Siri
Kifaa chako kinaunda funguo la siri kutoka kwa nenosiri lako kwa kutumia hesabu maalum
Tuma Uthibitisho
Ni uthibitisho wa kihesabu pekee unaotumwa kwetu - kamwe sio nenosiri lako
Thibitisha
Tunathibitisha uthibitisho - tunaweza kuthibitisha ni wewe bila kuona nenosiri lako
Ni kama kuwa na kufuli ambapo unashikilia funguo pekee, na sisi tunakagua tu kama funguo yako inafanya kazi.
Neno Lako la Urejelezi la Maneno 24
Unapowezesha Zero-Knowledge, unapata maneno 24 maalum. Maneno haya ni funguo yako kuu kwa akaunti yako.
Maneno haya yanatumika kwa nini?
- Pata tena akaunti yako ikiwa unakosa nenosiri lako
- Pata upya ufikiaji ikiwa unapoteza kifaa chako
- Ingiza kwenye kompyuta mpya
FANYA
- Yandika kwenye karatasi
- Hifadhi karatasi mahali salama (kama droo iliyofungwa)
- Fikiria kufanya nakala ya akiba mahali salama tofauti
USIFANYE
- Piga picha zao
- Hifadhi kwenye kompyuta yako
- Tuma kupitia barua pepe au ujumbe
- Shiriki na mtu yeyote
Kwa Nini Maneno 24?
- Maneno ni rahisi kuandika kwa usahihi
- Maneno ni rahisi kusoma na kuthibitisha
- Maneno 24 yanatoa usalama wa hali ya juu sana
Muhimu
Bila neno lako la urejelezi, HATUWEZI kusaidia kupata tena akaunti yako. Hii ni kwa makusudi - Zero-Knowledge inamaanisha hatuna ufikiaji wa nenosiri lako au funguo.
Inafanya Kazi Kila Mahali
Ulinzi wa Zero-Knowledge kwenye majukwaa yote ya anonym.legal
Maelezo ya Kitaalamu
Kwa wale wanaojali usalama
Argon2id Key Derivation
Algorithimu ngumu ya kumbukumbu inayofanya kukisia nenosiri kuwa polepole sana, hata na vifaa maalum.
XChaCha20-Poly1305
Uthibitisho sawa wa usimbaji ambao unatumika na wataalamu wa usalama duniani kote kwa ulinzi wa juu.
Hakuna Hifadhi ya Nenosiri
Hatuhifadhi kamwe nenosiri lako kwa aina yoyote - limefichwa, limepangwa, au vinginevyo.
Uthibitisho wa Wakati Usio Badilika
Ukaguzi wa usalama unachukua muda sawa bila kujali ingizo, kuzuia mashambulizi ya wakati.
Maswali Yanayoulizwa Mara kwa Mara
Je, wafanyakazi wa anonym.legal wanaweza kuona nenosiri langu?
Hapana. Hiyo ndiyo maana ya Zero-Knowledge! Nenosiri lako linafanyiwa kazi kwenye kifaa chako. Tunapokea tu uthibitisho wa kihesabu, kamwe sio nenosiri halisi.
Nini kitatokea ikiwa anonym.legal itavunjwa?
Nenosiri lako bado lipo salama! Wahacker wangeweza tu kupata uthibitisho wa kihesabu, si nenosiri. Bila nenosiri lako halisi, hawawezi kufikia akaunti yako.
Je, Zero-Knowledge ni ngumu kutumia?
Hapana! Hutaona tofauti yoyote unapojisajili. Hatua ya ziada pekee ni kuhifadhi neno lako la urejelezi la maneno 24 unapoweka akaunti yako kwa mara ya kwanza.
Je, naweza kuzima Zero-Knowledge?
Zero-Knowledge imewezeshwa kwa chaguo-msingi kwa ajili ya ulinzi wako. Tunapendekeza kuiacha ili kupata usalama bora.
Nini kitatokea ikiwa nitabadilisha nenosiri langu?
Unapobadilisha nenosiri lako, kifaa chako kinaunda funguo mpya za siri na unapata neno jipya la urejelezi la maneno 24. Neno lako la zamani la urejelezi halitafanya kazi, hivyo hifadhi neno lako jipya mara moja!
Baada ya uvunjaji wa LastPass, naweza vipi kuthibitisha kuwa mtoa huduma anatumia usimbaji fiche wa kweli wa maarifa sifuri?
anonym.legal inatumia uanzishaji wa funguo wa Argon2id (64MB kumbukumbu, mizunguko 3) inayofanyika kabisa kwenye kivinjari — seva haitawahi kupokea nenosiri lako au funguo za usimbaji. Usimbaji fiche wa AES-256-GCM unafanyika kabla ya data kuondoka kwenye kifaa chako. Hata uvunjaji kamili wa seva unatoa tu blob zilizofichwa bila funguo za kuzifungua.
Technical Appendix
Cryptographic parameters and protocol details for security auditors and developers.
Cryptographic Parameters
| Component | Algorithm | Parameters |
|---|---|---|
| Password Hashing | Argon2id | Memory: 64 MB, Iterations: 3, Parallelism: 1, Salt: 16 bytes, Output: 32 bytes |
| Symmetric Encryption | XChaCha20-Poly1305 | AEAD, 256-bit key, 24-byte nonce (random per operation) |
| Key Derivation | HKDF-SHA256 | Master Key → Auth Key + Encryption Key (domain separation) |
| Recovery Phrase | BIP39 | 256-bit entropy, 24 words, 2048-word wordlist |
| Random Number Generation | CSPRNG | crypto.getRandomValues (browser), libsodium.randombytes_buf (native) |
Key Derivation Chain
Sent to server for verification
Never leaves device
Protocol Flow
Registration
- 1Client generates random salt (16 bytes)
- 2Client derives Master Key via Argon2id(password, salt)
- 3Client derives Auth Key and Encryption Key via HKDF
- 4Client sends Auth Key + salt to server (password never sent)
Login
- 1Client requests salt from server (by email)
- 2Client re-derives Master Key via Argon2id(password, salt)
- 3Client sends Auth Key; server verifies with timing-safe comparison
- 4Server issues JWT session token; Encryption Key stays on device
Cross-Platform Compatibility
| Platform | Crypto Library | Argon2id Parallelism |
|---|---|---|
| Web App (Browser) | libsodium.js (WebAssembly) | 1 |
| Desktop App (Tauri) | rust-argon2 + libsodium.js | 1 |
| Office Add-in | libsodium.js (WebAssembly) | 1 |
Parallelism is set to 1 across all platforms to ensure cross-platform compatibility. A key derived on any platform works on all others.
From the Blog
View all articlesThe Compliance Cost of Inconsistent Redaction: How Configuration Drift Exposes Organizations to GDPR Fines
Analyst A replaces names with pseudonyms. Analyst B blacks them out. Your GDPR audit finds both in the same dataset. Configuration drift — where team members independently configure PII tools differently — creates audit failures, data quality problems, and legal risk.
Multi-Framework Privacy Compliance: Managing GDPR, HIPAA, and CCPA with One Anonymization Tool
Compliance teams managing GDPR, HIPAA, and CCPA must apply different anonymization standards depending on document context. Saved presets per framework reduce configuration errors from 15% to near zero.
Eliminating Anonymization Inconsistency: Why Teams Need Configuration Presets, Not Good Intentions
When 8 paralegals independently configure PII anonymization, inconsistency is inevitable. GDPR auditors look for systematic, consistent application of privacy controls. Shared presets encode approved configurations and eliminate configuration drift.
Linda Akaunti Yako Sasa
Unda akaunti na usalama wa Zero-Knowledge. Nenosiri lako linabaki kuwa lako - daima.