Safe Notes

Can securely store your private notes, passwords, credit card pins, photos and other private data. It can be use for secure mailing or chat.

SafeNotes is easy-to-use, powerful, multipurpose encryption application with today strongest encryption technology: Blowfish448-AES256-Twofish256-Serpent256-CAST256-IDEA with PBKDF2-BCrypt-SafeCrypt

Non-commercial freeware  
Installer • 64/32bit Windows 10/8/7/Vista/XP/98/95
In the year 2017 Safe Notes has been downloaded 3318 times.

about

About

Very easy installation and use. As with Notepad, you can simply open or create, edit and save a text information.

You can write various private notes or other texts that are securely stored.

It can be use for secure mailing and secure transfer for any text information or pictures.

Wipe Tool, for sensitive data destruction.

Steganography, for hiding information inside the picture so thats it is impossible to detect this.

Genuine Password Checker and Generator, very precise with nice graphics design. Support many popular encryption tools such as TrueCrypt, Keepass, VeraCrypt, PasswordSafe, etc.
READ MORE
security

Security

Very precise implementation with strongest crypto-algorithms used in cascade: Blowfish-AES-Twofish-Serpent-CAST6-IDEA

Every saved document is fully checked and verified for 100% correct encrypting and saving. All memory operation is wiped after use.

Sensitive information (e.g. passwords) are stored always only in encrypted form with random session key.

The safest application in the world. Three independent keys, each with six different ciphers uses symmetric encryption with 6720-bits.
READ MORE
tips

Tips

You need only remember one single master password for absolute security for all you data.

Can by used as very comfortable password manager.

True random password generator for your web and app accounts.

Can by used for picture encryption.

You can download Setup or Zipped portable.

Advanced user mode with unlimited password characters range 1-FFFF for every character (with easy typing) can substantially increase password security.
READ MORE

Features

  • Safe store of your private notes, texts, info about credit cards, pins, passwords and photos or pictures.
  • Secure mailing with simple copy & paste technique. Safe transfer of private documents, texts, photos via internet.
  • Steganography, hiding information inside the picture so thats it is impossible to detect this. It meets the strongest military standards. Can by use high grade image size resampler with Bicubic, Lanczos, Catmull-Rom, Mitchell, Gausian and other resample filters.
  • Genuine Password Checker and Generator, very precise with nice graphics design. Charts contains the entire history of computer performance. It can display the real strength of entered passwords for many popular encryption tools such as TrueCrypt, Keepass, PasswordSafe, 7zip, VeraCrypt, etc. It also includes high grade approximation of the future progress of decryption for the next millennium.
  • Wipe Tool, this is a sensitive data destruction tool, for secure delete files or free space wipe from hard drive or memory keys. You can choose from five different algorithms, such as U.S. DoD 5220.22-M(E) or Gutmann method.
  • Extreme password engine, high security even with a short password.
  • The strongest crypto algorithms are used simultaneously with safe-cascade.
    Note: When AES encryption is broken, more than 99% security software is not secure. For SafeNotes this is not a problem.
  • Very easy to use and very easy installation. The intelligence and power is hidden inside the application.
  • Supports all versions of Windows, Linux system with Wine.
  • Fully documented encryption module. Source code on web.
  • In English with support for other language mutations.
  • Highly portable; you can use only one exe application without installation. None information is writed out of data directory.
Top Secret - Safe Notes

Screenshots

Main window
Password dialog
Change file to safe
Stored secret notes
Mail encryption
Secure mailing in GMail
Future version - Encrypt Tool
Future version - Re-encrypt

Safe Notes - Cryptography

Why is SafeNotes secure?

Because it uses onlythe best and worldwide accepted hashes and cipher algorithms with precise implementation, and its encoding technique and output file structure is fully documented. Anyone may inspect the created output file from the input data and check it for backdoors or errors.

How secure are the encrypted SafeNotes files?

SafeNotes uses the finest hash algorithm with cycle cascading to generate unique key from passphrase, public master key and salt, and the best encode algorithm in cascade to encode the document. These are the best hash and encode algorithm and, used in these form,are absolutely unbreakable.

The only weak point is your password. Using purely random alphanumerically characters (a-z, A-Z, 0-9) as your passphrase, you need to specify 11 unique characters for 64-bit security. To solve this problem there is built-in passphrase dialog always displaying computed password quality.

What are the details of the encryption used in SafeNotes?

Your password is used as input to create the subkeys and the safekey. Cryptographic functions as SHA1, RipeMD160, Tiger2, SHA256, RipeMD320, SHA512, PBKDF2, BCrypt, SafeCrypt are used for key creation. The number of iterations is 52224.

Ciphers for encryption are AES, Blowfish, Twofish, IDEA, CAST6 and Serpent. They are used one after another in cascade with separate keys and initialization vectors. This requires a key with a 2240-bit length. SafeNotes uses three independent keys, one for head, one for salt and one for data encryption. This will increase the need for keys to 6720-bit. Much more than the most commonly used 128-bit and 256-bit keys.

Typically data is compressed before encryption using zlib, a standard deflate algorithm, described in RFC 1951 and RFC 1950. Two type of Salt is used to prevent rainbow table attacks. First salt, named as Public Master Key, is used after password entering. Second salt is used when file is being saved.

The data in the file header section contains information about the file size, file name and file modification times as well as version information, integrity checksum etc. Header is encrypted with unique key without ties to key for data encryption. For integrity checking two 48bit CRCs are used, binary compatible with CRC32 & CRC16. First is created for original unencrypted data stream and second for all data after encryption including the file header.

Detailed info available in SafeNotes White Papers.

Downloads

Safe Notes
Non-commercial freeware
For Microsoft Windows 10/8/7/Vista/XP/2000/98/95 (64/32 bit)
You can download setup or zipped archive file.
Operating System Version Download Type Descrption
Windows 32/64bit 5.0.0 Setup exe SafeNotes installer. Recommended for all users.
Windows 32/64bit 5.0.0 Archive zip Recommended for experience users. Must be manually unpack and install or used as portable version.
Windows 32/64bit 4.9.2 Archive zip Older version. Recommended for experience users. Must be manually unpack and install or used as portable version.
File Checksums:
Setup MD5: ed394db147830cbe01dc49b911dd19d1
Setup SHA1: 7ce34747601a61ac5d49cbc25ab2a7a69663d5e7
ZIP MD5: dbbf14d0d4579e6ea11777427bd02e72
ZIP SHA1: 3647be3067df9327473e9bf07bda7de076116cd1
Application MD5: a2cb74711fac13c2b5dbc2e8f9da4528
Application SHA1: 86105fd191f6eb4988b8e2a0663a5807b768f11a

V492 ZIP MD5: 44f4013a85036e376fc50d7430f76ad6
V492 ZIP SHA1: 65160d9f377de55029c5fd9c0f66d2249da22a56
V492 Application MD5: 75723697cbc7b7fc44dbbb6360ebef12
V492 Application SHA1: 3f6134409a18d95899f48a9d0179b27fced344c3


Guarantee 100% clean
Application does not contain any form of malware, spyware, viruses, trojans and backdoors. You can use scanning technology (from more than 50 companies e.g. AVG, Ad-Aware, Avast, Avira, BitDefender, Comodo, DrWeb, ESET-NOD, Kaspersky, McAfee, Panda, Symantec, Zoner) provided by VirusTotal for detection of viruses, worms, trojans, and all kinds of malware. Here is the VirusTotal results for SafeNotes. And here is another results from jotti.org and from Softpedia.
Safe Notes - source
Full source code. The created zipped archive is encrypted with the SafeNotes. This encryption is so good, that nobody can hack it and even the NSA with world-best supercomputers cannot break it. Therefore we chose it for self-encryption.
Operating System Version Download Type
Windows 32/64bit 4.9 - 5.0 Source code snf
This is only for programmers. Must be decrypt with correct password in Safe Notes application (command line parameters /decrypt filename.snf). After successfully decoding unpack to a directory and run the batch file "create_exe.bat". Package includes everything you need, compiler, all the resources, private keys, additional applications, see readme.txt. Published exe application was created exactly from this data with described procedure. When where usefull, we will publish password in future.
File Checksums:
MD5: 80b51290997334b32e70bc4954b71f98
SHA1: af809763670912b2e4f922f4f15efc7b457cf056


Help Us


Every day, SafeNotes life costs about 30 euros. We can not sponsor it forever.

Safe Notes is free for private non-commercial use and will never expire, but a little help from everyone is needed.


You can help us in several ways

Donate money:
- If you have a few dollars or euros to spare, you can donate to us. Thank you!

Give time:
- Recommend Safe Notes to your friends.
- Share Safe Notes on Facebook.
- Like Safe Notes on Facebook.
- If you are a native English speaker, help with language corrections in the program and the website. See FAQ.
- Help in the translation into your native language other than English. More info in FAQ.

Buy commercial product:
- Application is free for non-commercial use. Please order the commercial version in case you need to use the program for business needs. More info here.

Thanks!

"Privacy is a fundamental prerequisite to the freedom. Guardian of privacy is Safe Notes." - Peter H.Mind

"Encryption should be enabled for everything by default, not a feature you turn on only if you're doing something you consider worth protecting." Read more in "Why We Encrypt" by Bruce Schneier, an internationally renowned security expert and author on security issues.