No data collection
Notes+ does not collect, transmit, or store any of your data on external servers. There is no backend. There is no database. There are no API calls to any server we control. Everything you create — notes, photos, videos — lives on your device and nowhere else.
On-device encryption
All media stored in the vault is encrypted using AES-256, the same encryption standard used by financial institutions and governments. Encryption and decryption happen entirely on your device. Your vault password is never stored in plaintext — it's used to derive the encryption key locally.
If you uninstall the app without backing up, your encrypted data is gone. We can't recover it for you, because we never had it.
Google Drive backup
Notes+ offers optional Google Drive sync. If you choose to enable it, your backup is uploaded to your own Google Drive account — specifically to the app-specific folder that only Notes+ can access. We do not have access to your Google account, your Drive contents, or your backup files.
Backup is entirely user-initiated. You decide when to sync, and you can disconnect at any time. No data leaves your device unless you explicitly tell it to.
No analytics or tracking
There is no Firebase, no Google Analytics, no Crashlytics, no Mixpanel, no anything. We don't know how many people use Notes+, how often they open it, or what features they use. That's intentional. We don't need to know, and you shouldn't have to tell us.
No ads, ever
Notes+ has no ads and never will. There are no ad SDKs in the app, no ad networks, no sponsored content. The app is free because it's a personal project, not a business.
Permissions
Storage: Required to save and read encrypted media files on your device. Notes+ accesses only its own app directory — it does not scan your gallery, contacts, or any other files.
Internet: Used only for Google Drive sync (if enabled) and checking for app updates. No other network requests are made.
Camera: Not requested. Notes+ imports from your existing gallery — it doesn't take photos directly.
Questions?
If you have any privacy concerns, the source is available on GitHub. You can inspect every line of code yourself. This app has nothing to hide — that's the whole point.
Last updated: May 2026