You need to redact a social security number from a scanned form. Or sign off on a patient intake document before sending it to a specialist. Or strip a salary figure from an HR file before forwarding it to someone outside your company. You open a browser, search for an online PDF editor, and upload the file.
What happens to that document next is something most people never think about.
How Most Online PDF Tools Handle Your Files
When you upload a file to a typical web-based PDF editor, the file travels to a remote server owned by that company. The server opens it, processes it — rotating pages, applying redactions, flattening form fields — and then either sends the result back or stores a copy temporarily.
During that entire process, the PDF is readable on their infrastructure. An employee with server access could open it. A subpoena or government request could compel the company to hand it over. A misconfigured S3 bucket, a breach in their database, or a compromised backup could expose it.
Most providers are upfront about storing files for a short window — a few hours or a day — before deletion. That's a meaningful improvement over indefinite storage, but "deleted eventually" is not the same as "never readable." The file existed in cleartext on their systems, and that window is the attack surface.
The trust model is: you trust the company, their employees, their infrastructure, their security practices, and their legal jurisdiction. For a casual document that's fine. For anything sensitive, it's a significant leap.
What End-to-End Encryption Actually Means
End-to-end encryption (E2EE) changes the trust model fundamentally.
With E2EE, encryption happens in your browser before the file leaves your device. By the time any bytes reach a server, they are already scrambled into ciphertext — indistinguishable from random data without the key. The server stores that ciphertext, but it cannot read it. Decryption happens in your browser when you open the document again.
The "end-to-end" part refers to the two ends: your device is one end, and the recipient (or your future self opening the file) is the other. The server sits in the middle and is deliberately kept blind.
This is the same model used by encrypted messaging apps like Signal. The difference is that applying it to file storage and editing — where you need to save, reload, and modify documents — requires a more layered approach than a simple message exchange.
How RedaktPDF's Encryption Works
RedaktPDF uses a key hierarchy designed so that the server is cryptographically prevented from accessing your documents — not just contractually committed to privacy, but technically unable.
When you enable encryption, your password is run through PBKDF2 (600,000 iterations) to derive a master key. That master key never leaves your browser. It is used to wrap a Key Encryption Key (KEK), which in turn wraps a per-document File Key (FK). The wrapped versions of these keys — which are useless without your password — are stored on the server. The plaintext versions exist only in memory in your browser tab.
When you upload a document, the browser encrypts the PDF bytes, page images, and extracted text using AES-256-GCM with the File Key before any data is sent. What the server receives is encrypted blobs. When you open the document again, the browser fetches those blobs, derives the keys from your password, and decrypts locally. The server is never involved in the decryption step.
When you export from the secure PDF editor, the edited document is assembled and downloaded directly from your browser — it is never re-uploaded to the server in decrypted form.
The practical result: even if the server's database were breached tomorrow, the attacker would have a pile of encrypted data and wrapped keys they cannot unwrap without your password.
When E2E Encryption Matters Most
Not every PDF needs encryption. A recipe you scanned, a concert ticket, a flyer — these are not sensitive. But a surprisingly large share of documents people edit online are sensitive, even when the person uploading them doesn't stop to think about it:
Medical records are the clearest case. HIPAA requires covered entities to protect patient health information, and the definition of "protected" extends to any vendor you use to process that information. Uploading a patient record to a standard online tool may violate your compliance obligations regardless of the vendor's privacy policy.
Legal documents — contracts, settlement agreements, estate planning documents — often contain terms or financial figures that one party has strong reasons to keep confidential. Routing them through a third-party server creates a discovery risk you may not have considered.
Financial statements — tax returns, brokerage account exports, loan applications — contain exactly the data identity thieves target. Social security numbers, account numbers, income figures.
HR documents — offer letters, performance reviews, compensation data, termination agreements — can expose individuals and create legal liability if disclosed.
Any document with PII — names combined with addresses, dates of birth, government ID numbers, or medical information — carries risk under privacy laws in most jurisdictions.
If you are editing any of these, the question is not whether encryption matters. It is whether the tool you are using provides it.
What E2E Encryption Does Not Protect Against
It is worth being clear about the limits, because overclaiming the security of any system is its own form of misleading.
E2EE does not prevent screenshots. Someone with access to your screen — via screen sharing, malware, or physical proximity — can capture what is displayed. Encryption protects data in transit and at rest, not data that is being rendered on screen.
E2EE does not protect against a compromised device. If your browser, operating system, or device has been compromised by malware, an attacker can intercept the decrypted data before encryption happens or after decryption completes. Encryption does not substitute for device security.
E2EE does not mean zero-knowledge if you share. If you send an encrypted document to a collaborator, they receive a copy. That copy is decrypted on their device. What happens to it after that is outside your control. E2EE protects the document from the infrastructure, not from the people you share it with.
E2EE does not protect your account metadata. Your email address, document names, timestamps, and access patterns are not encrypted. The server knows you uploaded a document and when — it just cannot read what is in it.
These are not reasons to avoid encryption. They are reasons to understand what problem encryption solves and what problems require different solutions.
The Default Should Be Better
Most online tools default to cleartext server processing because it is simpler to build and simpler to explain. Encryption requires more engineering — key management, browser-side crypto, careful handling of password changes and recovery.
But "simpler to build" is not a good reason to expose your documents. For the categories of files that matter — medical, legal, financial, anything with personal information — the default should be that the service provider cannot read your data even if they wanted to.
That is what end-to-end encryption provides, and it is what the secure PDF editor at RedaktPDF is built around.
Ready to try RedaktPDF?
Edit, redact, and annotate PDFs directly in your browser — free and encrypted.
Get started