Tusky Encryption
In this overview of Tusky's encryption, we cover cryptographic primitives used, encryption flows, private key backup and recovery, and future work on quantum resistance.
All data exchanged within private vaults in Tusky is end-to-end encrypted. In other words, everything is encrypted locally, before it ever leaves your device.
We use industry standard algorithms to perform all cryptographic operations.