Every conversation builds your business memory. That intelligence should belong to you—cryptographically.
Every AI tool you use builds a dossier on your business. ChatGPT knows your strategy. Notion AI has your roadmap. Your "AI assistant" has seen your cap table, your investor conversations, your hiring plans.
For Crew One, it's even more sensitive: we store compounding memory—decisions made, relationships tracked, patterns learned over time. A breach isn't one conversation. It's your complete business intelligence layer.
We believe that data should be readable only by you.
Crew One is implementing client-side encryption for all business memory. Your encryption keys are derived from your passphrase—we never see them.
Your encryption keys are generated on your device. We never have access to them.
Industry-standard encryption for all stored memories, decisions, and relationships.
We store your encrypted data. We cannot decrypt it—literally.
When you delete, it's gone. Cryptographically. No 30-day retention, no soft deletes.
Your passphrase never leaves your device. The encryption key is derived using Argon2id—the same key derivation function used by password managers and security-critical applications.
Most AI tools say "secure." We show the receipts.
| Feature | Crew One | Others* |
|---|---|---|
| Encryption at rest | ||
| Client-side keys | ||
| You control decryption | ||
| Published architecture | ||
| True deletion |
*Based on publicly available documentation from major AI assistant tools. "Unknown" means no clear documentation found.
"Military-grade encryption" marketing is bullshit. Here's exactly what protection you get.
| Symmetric Encryption | AES-256-GCM |
| Key Derivation | Argon2id |
| Asymmetric Keys | X25519 |
| Passphrase Requirement | 12+ characters (not 6-digit PIN) |
| Recovery | Recovery key backup + optional hardware key |
We're being transparent: this encryption architecture is currently in development. We're publishing our design now because we believe in building trust through honesty, not vague "enterprise-grade security" claims.
Want to follow our progress? Join the waitlist and we'll share updates as we ship.
We welcome scrutiny. If you're a security researcher or have questions about our approach, we'd love to hear from you.