Analysis of Drime Cloud's E2EE and Zero-Knowledge Claims

October 2025

Summary

This document examines the encryption claims made by Drime Cloud regarding their "Vault" feature. Through API analysis, I found significant discrepancies between their marketing statements and the actual implementation.

Drime Cloud advertises their Vault as having "zero-knowledge" and "end-to-end encryption," stating that "Only you can see your files. Not us, not anyone else." However, API responses show that all file and folder metadata is transmitted in plaintext to their servers.

Background

Drime Cloud is a file storage service based in the European Union. Their Vault feature is marketed as a secure, encrypted storage solution for sensitive files. The service claims to implement zero-knowledge encryption, which typically means that the service provider cannot access any user data, including metadata.

Marketing Claims

The following statements appear on Drime's official website at drime.cloud/vault:

"Drime end-to-end encrypted (E2EE) Vault provide the most secure way to store your most sensitive files in the cloud."
"Zero-knowledge: Only you can see your files. Not us, not anyone else. We don't store passwords, and we can't access your data."
"Your files are encrypted on your device and never leave it unprotected. Only you can access them, not even Drime."
Drime marketing claim screenshot 1

Figure 1: Drime's "Zero-knowledge" marketing claim

Technical Analysis

When accessing the Vault feature, the client makes an API request to:

https://app.drime.cloud/api/v1/vault/file-entries

The response contains the following data structure:

{
    "id": 26833,
    "name": "My Confidential Tax Documents",
    "description": null,
    "file_name": "2024_tax_return.pdf",
    "mime": "application/pdf",
    "file_size": 2547891,
    "type": "folder",
    "extension": "pdf",
    "created_at": "2025-10-03T19:45:30.000000Z",
    "updated_at": "2025-10-05T16:38:35.000000Z",
    "path": "26833",
    "vault_id": 440,
    "is_encrypted": 1
}

Exposed Metadata

The API response reveals the following information in plaintext:

The response includes an "is_encrypted" flag set to 1, which appears to indicate that file contents are encrypted, but not the metadata.

API response showing plaintext metadata

Figure 2: API response showing unencrypted metadata in browser DevTools

Comparison with Industry Standards

True zero-knowledge encryption implementations encrypt metadata on the client side before transmission. For comparison, pCloud's Crypto Folder service returns encrypted filenames:

{
    "name": "CM4LSAOHWDTXNPEJF2XZA67KOPDJ5XOJWACR3JVTT4KK3DRQBAE5RHIY4Z4IUKSDO4AM4ZODDSH7S",
    "encrypted": true,
    "contenttype": "application/octet-stream"
}

Other services implementing true zero-knowledge encryption include:

pCloud Crypto encrypted filename comparison

Figure 3: pCloud Crypto folder showing encrypted filename vs Drime's plaintext

Privacy Implications

The exposure of metadata has significant privacy implications:

Information Type Visible to Drime Privacy Risk
File names Yes Reveals document subject matter
Folder structure Yes Shows organization and categories
File types Yes Indicates content nature (medical, financial, etc.)
Access times Yes Behavioral patterns and frequency
File sizes Yes Can infer content complexity

This metadata can be:

Additional Security Concern

The vault_id field uses sequential integers (440, 441, 442, etc.). This implementation allows any user to determine the total number of vaults created system-wide by creating and deleting vaults and observing the increment. This is a minor information disclosure that violates common security practices. Standard implementations use UUIDs or random identifiers to prevent enumeration.

Sequential vault_id demonstration

Figure 4: Sequential vault_id allowing enumeration of total vaults

Reproduction Steps

The findings can be verified using the following process:

  1. Create a Drime account and enable the Vault feature
  2. Create folders with descriptive names (e.g., "Personal Medical Records")
  3. Upload files with recognizable filenames
  4. Open browser developer tools (F12) and navigate to the Network tab
  5. Access the Vault by entering the vault password
  6. Locate the API request to /api/v1/vault/file-entries
  7. Examine the JSON response body

All metadata will be visible in plaintext in the response.

Company Response

When these findings were initially reported, Drime's team responded with the following statement:

"Drime Vault is a new feature, and we've already addressed these concerns. The file content is fully end-to-end encrypted, it's encrypted on your device before being uploaded. Some providers use the term 'zero knowledge,' which usually means that even metadata is encrypted. We plan to bring this level as well once Vault is fully stable."

In a subsequent response, they stated:

"We do not claim 'zero knowledge', and we've already clarified this in past discussions when asked."

This statement contradicts their marketing page, which explicitly includes a section titled "Zero-knowledge" with claims about data access.

Drime team response denying zero-knowledge claims

Figure 5: Drime's response claiming they "do not claim 'zero knowledge'"

Note on Censorship: After posting these findings on their subreddit, my account was permanently banned and the post was removed along with the Drime team's response. This occurred shortly after their response received several upvotes.

Edit: They have since changed "Zero-knowledge" to "Secure Vault" on their website. The original page can be viewed at: https://web.archive.org/web/20250726003342/https://drime.cloud/vault

Legal and Regulatory Considerations

Drime Cloud operates in the European Union and markets services to EU citizens. The discrepancy between marketing claims and actual implementation may raise concerns under several regulatory frameworks:

The use of terms like "zero-knowledge" and statements such as "Not us, not anyone else" while maintaining server-side visibility of metadata could be considered misleading to consumers making security decisions.

Recommendations

For Drime Cloud:

For users considering Drime Vault:

Conclusion

Drime Vault appears to implement encryption-at-rest for file contents, which provides some level of protection. However, the implementation does not meet the industry standard definition of "zero-knowledge" encryption, which requires that metadata also be encrypted client-side before transmission.

The marketing materials make explicit claims that contradict the technical implementation. Users who choose Drime Vault based on these claims may have a false sense of security regarding their metadata privacy.

Transparency in security claims is essential for users to make informed decisions about their data. Services should accurately represent their capabilities, particularly when dealing with sensitive information.


This analysis was conducted in October 2025. All evidence has been archived and is available for verification. For questions or additional information, please refer to the accompanying repository.