Clipaste - Encrypted Clipboard History

By default, Clipaste encrypts your saved clipboard history on disk. This protects the content you copied (text, rich text, metadata, and history records) from being read directly from the app’s local storage by someone who gains access to your files (for example, on a shared computer account, a stolen laptop, or a disk backup).

This is "encryption at rest": it protects the history stored by Clipaste, not the system clipboard itself.

Why it matters

What Clipaste encrypts

When history encryption is enabled, Clipaste encrypts the Hive database that stores clipboard history entries, including (depending on what you copied):

What is NOT encrypted

How encryption works

Storage engine:

Cipher and key size:

Per-user key management (no password):

Clipaste treats switching encryption as a storage reset for safety and clarity. When you change the "Encrypt clipboard history" setting, Clipaste asks for confirmation. If you confirm, Clipaste clears the current clipboard history and then reopens the appropriate database file (encrypted or unencrypted). This avoids partial migrations and makes it explicit that encrypted and unencrypted histories are separate stores.

Limitations

FAQ

Is Clipaste "end-to-end encrypted"?

No. Clipaste’s encryption is local, at-rest encryption for the clipboard history database. Clipaste does not upload your clipboard history to a server.

Do I need to create a password?

No. Encryption uses a per-device, per-OS-user key stored in the OS credential store.

Can I turn encryption off?

Yes. Clipaste supports disabling history encryption, with a confirmation that explains history will be cleared when switching modes.

Will encryption slow things down?

Encryption adds overhead during reads/writes of history data, especially for very large history sizes. Clipaste is optimized to minimize unnecessary rewrites and may compact storage after bulk deletes to keep performance stable.


HomeCross-PlatformClipasteEncryption