Mindoo Blog - Cutting edge technologies - About Java, Lotus Notes and iPhone

  • MindooDB - end-to-end encrypted sync database, avallable as open source

    Karsten Lehmann  26 February 2026 09:53:55
    Yesterday, Samsung announced that the new Galaxy S26 Ultra will feature a “Privacy Display”-a function that allows certain areas of the screen to be protected from prying eyes. What was previously only possible with privacy filters for the entire screen can now be activated for specific areas or apps.

    An interesting detail - but above all a symptom of a larger issue.

    Privacy, data security, and data sovereignty should be a concern for everyone.
    What data do I store and where?
    What happens in the event of data loss?
    What happens if sensitive information falls into the wrong hands?

    This is relevant in a private context. In a business context, it is existential. Anyone who processes personal data must not only implement protective measures within the framework of the GDPR, but also be able to document and verify them.

    Charlie Munger, Warren Buffett's long-time business partner, recounted in interviews how he approached his job as a young meteorologist in the US Army Air Corps. Instead of asking himself,
    “How can I keep the pilots safe?”
    he turned the question on its head:
    “What is the easiest way to kill the pilots?”

    And he systematically eliminated precisely those causes.

    Applied to our handling of data, the inverted questions could be:

    - How can I put as much (customer) data entrusted to me as possible on the internet without protection?
    - How can I reliably ensure that my company is unable to operate for days on end due to hacked systems, failures, or data loss?
    - How can I ensure that, in an emergency, I cannot trace or prove who changed which data and when?

    The answers to these questions are alarmingly simple:
    Unprotected servers. Missing updates. Unencrypted storage. Services where operators or administrators have access to sensitive content. No traceable change history.

    If you consistently avoid these sources of error, a different architectural principle emerges.

    This is exactly where MindooDB comes in.

    The central design decision:
    Neither the server itself nor the operator has access to the data.

    All information is stored with end-to-end encryption. Synchronization takes place via the server or directly via peer-to-peer between clients. Every change is digitally signed. This makes it possible to trace exactly when which data change was made by which participant.

    The underlying append-only data model enables a complete history.
    Audits can be carried out reliably.
    Historical analyses become possible - for example, the question of how project planning has changed due to new customer requirements.

    MindooDB is an end-to-end encrypted sync database for desktop and mobile devices.
    All data. On all devices. Shared securely.

    Available under the Apache 2.0 license.
    For more information, visit https://mindoodb.com.