October 2025
This document examines the encryption claims made by Drime Cloud regarding their "Vault" feature. Through API analysis, I found significant discrepancies between their marketing statements and the actual implementation.
Drime Cloud advertises their Vault as having "zero-knowledge" and "end-to-end encryption," stating that "Only you can see your files. Not us, not anyone else." However, API responses show that all file and folder metadata is transmitted in plaintext to their servers.
Drime Cloud is a file storage service based in the European Union. Their Vault feature is marketed as a secure, encrypted storage solution for sensitive files. The service claims to implement zero-knowledge encryption, which typically means that the service provider cannot access any user data, including metadata.
The following statements appear on Drime's official website at drime.cloud/vault:
"Drime end-to-end encrypted (E2EE) Vault provide the most secure way to store your most sensitive files in the cloud."
"Zero-knowledge: Only you can see your files. Not us, not anyone else. We don't store passwords, and we can't access your data."
"Your files are encrypted on your device and never leave it unprotected. Only you can access them, not even Drime."
Figure 1: Drime's "Zero-knowledge" marketing claim
Technical AnalysisWhen accessing the Vault feature, the client makes an API request to:
https://app.drime.cloud/api/v1/vault/file-entries
The response contains the following data structure:
{ "id": 26833, "name": "My Confidential Tax Documents", "description": null, "file_name": "2024_tax_return.pdf", "mime": "application/pdf", "file_size": 2547891, "type": "folder", "extension": "pdf", "created_at": "2025-10-03T19:45:30.000000Z", "updated_at": "2025-10-05T16:38:35.000000Z", "path": "26833", "vault_id": 440, "is_encrypted": 1 }
The API response reveals the following information in plaintext:
The response includes an "is_encrypted" flag set to 1, which appears to indicate that file contents are encrypted, but not the metadata.
Figure 2: API response showing unencrypted metadata in browser DevTools
True zero-knowledge encryption implementations encrypt metadata on the client side before transmission. For comparison, pCloud's Crypto Folder service returns encrypted filenames:
{ "name": "CM4LSAOHWDTXNPEJF2XZA67KOPDJ5XOJWACR3JVTT4KK3DRQBAE5RHIY4Z4IUKSDO4AM4ZODDSH7S", "encrypted": true, "contenttype": "application/octet-stream" }
Other services implementing true zero-knowledge encryption include:
Figure 3: pCloud Crypto folder showing encrypted filename vs Drime's plaintext
The exposure of metadata has significant privacy implications:
Information Type | Visible to Drime | Privacy Risk |
---|---|---|
File names | Yes | Reveals document subject matter |
Folder structure | Yes | Shows organization and categories |
File types | Yes | Indicates content nature (medical, financial, etc.) |
Access times | Yes | Behavioral patterns and frequency |
File sizes | Yes | Can infer content complexity |
This metadata can be:
The vault_id field uses sequential integers (440, 441, 442, etc.). This implementation allows any user to determine the total number of vaults created system-wide by creating and deleting vaults and observing the increment. This is a minor information disclosure that violates common security practices. Standard implementations use UUIDs or random identifiers to prevent enumeration.
Figure 4: Sequential vault_id allowing enumeration of total vaults
The findings can be verified using the following process:
All metadata will be visible in plaintext in the response.
When these findings were initially reported, Drime's team responded with the following statement:
"Drime Vault is a new feature, and we've already addressed these concerns. The file content is fully end-to-end encrypted, it's encrypted on your device before being uploaded. Some providers use the term 'zero knowledge,' which usually means that even metadata is encrypted. We plan to bring this level as well once Vault is fully stable."
In a subsequent response, they stated:
"We do not claim 'zero knowledge', and we've already clarified this in past discussions when asked."
This statement contradicts their marketing page, which explicitly includes a section titled "Zero-knowledge" with claims about data access.
Figure 5: Drime's response claiming they "do not claim 'zero knowledge'"
Drime Cloud operates in the European Union and markets services to EU citizens. The discrepancy between marketing claims and actual implementation may raise concerns under several regulatory frameworks:
The use of terms like "zero-knowledge" and statements such as "Not us, not anyone else" while maintaining server-side visibility of metadata could be considered misleading to consumers making security decisions.
For Drime Cloud:
For users considering Drime Vault:
Drime Vault appears to implement encryption-at-rest for file contents, which provides some level of protection. However, the implementation does not meet the industry standard definition of "zero-knowledge" encryption, which requires that metadata also be encrypted client-side before transmission.
The marketing materials make explicit claims that contradict the technical implementation. Users who choose Drime Vault based on these claims may have a false sense of security regarding their metadata privacy.
Transparency in security claims is essential for users to make informed decisions about their data. Services should accurately represent their capabilities, particularly when dealing with sensitive information.
This analysis was conducted in October 2025. All evidence has been archived and is available for verification. For questions or additional information, please refer to the accompanying repository.