.mv2e extension and require a password to access.
Overview
| Feature | Specification |
|---|---|
| Cipher | AES-256-GCM (authenticated encryption) |
| Key Derivation | Argon2id (memory-hard, GPU-resistant) |
| File Extension | .mv2e (encrypted capsule) |
| Compatibility | Decrypt to use with any Memvid command |
Encrypting a Memory File
Interactive Password
Password from Stdin (for Scripts)
Options
Decrypting a Capsule
Interactive Password
Password from Stdin
Options
Working with Encrypted Files
Encrypted files must be decrypted before use:Workflow: Edit and Re-encrypt
Security Details
AES-256-GCM
- 256-bit key: Derived from your password via Argon2id
- Authenticated: Detects tampering or corruption
- Unique nonce: Each encryption uses a fresh random nonce
- No metadata leakage: File size is only indicator of content size
Argon2id Key Derivation
- Memory-hard: Requires significant RAM, resists GPU attacks
- Time-hard: Configurable iterations for speed/security tradeoff
- Salt: Unique random salt per encryption
- Winner: Password Hashing Competition (2015)
| Parameter | Value |
|---|---|
| Memory | 64 MB |
| Iterations | 3 |
| Parallelism | 4 |
Password Requirements
Recommendations
| Requirement | Recommendation |
|---|---|
| Minimum length | 12 characters |
| Recommended | 16+ characters |
| Best | 20+ characters or passphrase |
Strong Password Examples
Weak Passwords to Avoid
- Dictionary words:
password,memory,secret - Simple patterns:
123456,qwerty,abcdef - Personal info: birthdays, names, addresses
- Short passwords: anything under 12 characters
Automation & CI/CD
Environment Variables
GitHub Actions Example
Docker Example
Use Cases
Sensitive Documents
Encrypt memories containing confidential information:Backup & Archive
Secure long-term storage:Sharing Encrypted Memories
Share with password communicated separately:Compliance Requirements
For HIPAA, GDPR, SOC2, etc.:Error Handling
Wrong Password
Corrupted File
File Already Exists
Best Practices
1. Use Strong Passwords
2. Keep Backups of Unencrypted Data
If you lose the password, data is unrecoverable:3. Separate Password from Encrypted File
- Never store password in same location as encrypted file
- Use different channels (email file, text password)
- Use secrets managers (Vault, 1Password, etc.)
4. Rotate Passwords Periodically
5. Verify After Encryption
Limitations
| Limitation | Description |
|---|---|
| No streaming | Must decrypt entire file to access |
| No partial access | Can’t read individual frames without full decrypt |
| Password only | No key file or hardware key support (yet) |
| No key escrow | Lost password = lost data |
Future Features
Coming soon:- Key file support (in addition to password)
- Hardware security module (HSM) integration
- Partial decryption for large files
- Key rotation without full re-encryption