RemoteDesk uses end-to-end encryption, zero-knowledge proofs, and open-source auditing to ensure your remote sessions remain private.
Every RemoteDesk session uses AES-256-GCM encryption with ephemeral keys. The signaling server never sees your screen, SDP offers, or ICE candidates—only signed ciphertext.
ENCRYPTION_FLOW: ┌─ Host Screen Capture ─┐ │ (1920x1080@60fps) │ └──────────┬────────────┘ │ ▼ ┌─ H.264 Encoding ─┐ │ (Adaptive BR) │ └────────┬──────────┘ │ ▼ ┌─ AES-256-GCM ─┐ │ (Authenticated)│ └────────┬───────┘ │ ▼ [SIGNALING SERVER] Sees: Ciphertext only │ ▼ [VIEWER's Decryption] Uses: Ephemeral key │ ▼ [H.264 Decode → Display]
We use ECDH-P256 for forward secrecy and ephemeral key negotiation. Each session gets a unique key pair that's discarded after the session ends.
6-word safety numbers are displayed to both parties. Out-of-band verification ensures no MITM substitution.
Every action is logged with millisecond precision and cryptographically signed. Support teams get an immutable record of what happened, when, and by whom.
Export Formats
Audit trails can be exported as signed HTML (human-readable) or JSON (machine-parseable). HMAC-SHA256 signatures allow organizations to verify integrity even years later.
For sensitive work (healthcare, finance, personal data), draw redaction boxes on your screen. Masking happens before encoding—the viewer never sees the sensitive content.
Select sensitive areas in real-time
Blur/blacken masked regions
Only masked view—original data stays local
Privacy-First by Design
Information Security Management System. Audited annually.
Business Associate Agreement (BAA) available. Healthcare-grade encryption.
GDPR-compliant data processing. DPA included in Enterprise plans.
India's Digital Personal Data Protection Act compliant.
Service Organization Control audit completed. Full report on request.
Payment Card Industry Data Security Standard ready for merchants.
We welcome responsible security research. If you find a vulnerability, please report it to security@remotedesk.app.
26 pages of technical details, cryptographic proofs, and architecture diagrams.