End-to-end encryption and multi-device synchronisation for 6M users
Bear app is a popular note-taking application for iOS/macOS platforms. It is featured by Apple as one of the competitors to Apple's native Notes app. The Shiny Frog team behind Bear values users' privacy: by design they don't have access to users' notes and don't transmit them via their own backend servers. At some point, Bear app users started asking for specific features (encryption and locking) to protect their notes.
There were several business-sensitive aspects to be kept in mind. First, adding reliable note encryption into the application flow should preserve smooth user experience. Next, the huge user base (500K monthly active devices!) leads to numerous possible corner-cases, which we should foresee and prevent.
Industry
productivity apps
note-taking apps
Technology stack
iOS
macOS
Apple cloud backend
Regulations
GDPR
Encryption Export Regulations
Technology requirements
End-to-end encryption
End-to-end encryption of user notes should be based on solutions compatible with Apple platform, but at the same time, it should be easy to migrate to Web/Electron platform that Bear team has in the roadmap.
Multi-device synchronisation
Support of multi-device synchronisation for encrypted notes and notes' passwords since a typical Bear user uses the app on several Apple devices (iPhone, iPad, MacBook).
Easy to maintain cryptography
Encryption engine should be easy to maintain, support, and update by non-cryptographers, giving the Bear dev team the necessary flexibility for introducing changes.
Challenges
Transparency for users
Bear app doesn't have externally enforced strict security requirements (unlike, for instance, fintech/banking-related apps) so cannot force users to create strong and unique passwords.
Losing data is out of question
Losing or not being able to decrypt user notes is a significant threat and reputational risk. The Bear team can't access iCloud database of their users, meaning there's no “admin way” to help users if they forget or lose their passwords.
Security that doesn't ruin UI/UX
Smooth user experience is a part of UVP, so the encryption scheme should not complicate the UX, but rather overcome the limitations.
Mobile platform specifics
Mobile users have multiple devices, some of them online and some of them offline, which requires careful synchronisation of encrypted data and keys.
Solution
We have designed secure data flow architecture based on our open-source cryptographic library Themis, applicable usability and security considerations, and industry standards (Apple security guidelines, iOS Data Storage guidelines and OWASP MASVS).
We designed end-to-end encryption engine with the following properties:
- Each protected note is stored and transferred in encrypted form throughout the whole system, decrypted only on a user's device after successful authentication.
- Each note of each user is encrypted by a unique encryption key using Themis library (AES-GCM-256).
- According to the threat model, no data is stored in Keychain in plaintext; notes' encryption keys are not stored at all.
- The security system is flawlessly integrated into the UX: instead of asking user's password often, the application implements proper key management procedures (key generation, key stretching and caching).
- The designed protocol supports changing users' password and synchronisation of notes when some of the users' devices are online or offline.
- The built-in biometrics engine is used for restoring access to the encrypted notes if a user forgets the password.
- The encryption engine is designed to be easily updated in case of discovered vulnerabilities or bugs.
Besides the cryptographic core, we've also provided a number of security recommendations for development aligned with “defense in depth” approach:
- Usage of platform-specific security controls to provide maximum security guarantees (biometrics authentication, integration with SecureEnclave and iCloudKeychain).
- Application auto-locking in case of user inactivity for a set amount of time (maybe they've left their phone on a table?); locking time calculations are based on a monotonic timer.
- Data minimisation and clean-up – removing notes' content from memory as soon as the user closed the note (or due to app locking).
- Protecting the password hint because users often put their password as a hint, so it wouldn't make much sense to protect the password and leave the hint in plaintext.
- Prevention of manual passphrase brute forcing by using a counter of failed attempts and throttling user input.
- Multi-level test suite based on unit/integration tests to cover as many corner cases as possible.
Products and services involved
Themis, a cross-platform crypto library
We used cryptographic library Themis as a building block for transport layer encryption on application level, relying on its interoperability among required platforms and OSs.
Read moreThemis, a cross-platform crypto libraryCryptography engineering
We've designed the end-to-end encryption protocol, assisted with implementation and verification.
Read moreCryptography engineeringMobile app security
We've recommended platform-specific security controls for data protection outside of end-to-end encryption scope.
Read moreMobile app securityResults and outcomes
Our solution provides strong security guarantees, uses platform-specific security controls, and is fully integrated into the Bear application flow without ruining the user experience.
The new secured Bear app had a very successful release after a short beta-testing phase. End-to-end encryption was one of the release's main highlights. Our engineers worked closely with Bear app's team, designing cryptographic protocol, helping with implementation, suggesting security improvements, and verifying the results.
The resulting solution attracted security-aware users, potentially allowing Bear app to increase and consolidate their user base and provided a clear competitive advantage over their competitors.
Usable security is not a myth
It's possible to build secure and usable systems, but it takes efforts. Use our products 'as is' or build specialised solutions to take your data security to the next level.