Security model

Built so Relay cannot read your bookmarks.

Relay syncs bookmarks through an end-to-end encrypted, zero-knowledge vault. Your password stays in the browser, bookmark contents are encrypted before upload, and the backend stores only encrypted vault data plus limited operational metadata.

End-to-end encrypted Zero-knowledge vault No analytics SDK Independent review planned

What Relay can and cannot see

Relay can store encrypted vault data

The server needs the encrypted blob, a derived vault lookup key, browser-limit metadata, rate-limit metadata, and plan state to operate sync.

Relay cannot read bookmark contents

Readable bookmark titles, URLs, folders, and profiles are encrypted in the browser before upload. The password is not sent to Relay.

Relay can enforce ownership

Sensitive actions require a local ownership token recovered only after a browser decrypts the vault with the correct password.

Relay cannot reset your password

Password recovery would require Relay to hold a decryption path. Relay intentionally does not.

Extension permissions

Relay requests only the permissions needed for bookmark sync:

Independent verification roadmap

Relay is preparing for an independent browser-extension security review. We will publish only completed review summaries, not future-tense certification claims. The planned review scope is:

Current status: no third-party certification has been claimed yet. Chrome Web Store distribution is the normal install path, and independent audit evidence will be added after completion.

Report a security issue

Please use the support page for a private reporting path. Do not send passwords, full bookmark exports, private URLs, or exploit playbooks in an initial report.

Contact Relay support