Vulnerable lives
deserve encrypted files.
Case notes about abused children, domestic violence survivors, at-risk families — these files describe the most vulnerable members of society. A data breach doesn't just expose information; it can endanger lives. Writtt encrypts case files locally with AES-256.
Download — it's freeYour case files carry life-or-death weight.
Vulnerable data on cloud servers
Case files on cloud platforms put the most sensitive personal information — abuse reports, child welfare assessments — on servers managed by tech companies.
Safety risks from breaches
A leaked domestic violence case file can reveal a survivor's location to their abuser. The stakes aren't just about privacy — they're about physical safety.
Institutional over-access
Agency-managed cloud accounts may give administrators, contractors, or IT staff unnecessary access to sensitive case details.
Protection that matches the vulnerability.
Case-level encryption
Each case file can be individually encrypted with AES-256-GCM. Even if your device is compromised, locked files are unreadable.
No server, no breach surface
Case files exist only on your device. No cloud copy, no agency server backup, no third-party exposure.
Field work ready
Home visits, shelters, rural areas — Writtt works without internet. Document on-site without connectivity concerns.
Zero tracking
No analytics on which cases you open, how long you spend, or what you write. Your workflow reveals nothing about your clients.
“When a file can endanger the person it describes, the security of that file is not a convenience — it's a responsibility.
Frequently asked questions
Writtt is ideal for working notes, field observations, and case reflections that need encryption. For official agency records, use your mandated systems — but keep your sensitive notes encrypted locally.
Writtt provides AES-256 encryption with zero data transmission. Files never leave your device, eliminating cloud-based breach risks for the most sensitive case types.
Only if you explicitly share the decrypted content. Encrypted files require your password. There is no administrative backdoor or remote access.
Protect the people you serve.
Military-grade encryption for case files that describe vulnerable lives. Free, offline, open source.
Download — it's free