Canvas Got Hacked. Your Students' Data Was Never Really Private Anyway.
The Instructure Canvas breach exposes a structural flaw: centralized data is a target. Here's what the hack reveals about cloud-first architectures — and who pays the price.

Canvas Got Hacked. Your Students' Data Was Never Really Private Anyway.
The Instructure Canvas breach is a reminder of something privacy advocates have been saying for years: centralizing sensitive data on a vendor's servers doesn't make it secure — it makes it a target. When a widely-used learning management system gets compromised, millions of students, educators, and administrators find their data exposed through no fault of their own. They trusted the platform. The platform failed them.
Reports of the Canvas hack point to unauthorized access to user data held by Instructure, the company behind the Canvas LMS. Canvas is embedded in thousands of universities, K–12 districts, and corporate training programs worldwide. The scope of what was potentially exposed — student records, communications, institutional data — underscores a structural problem that no patch will fully fix.
The Real Issue Isn't This Hack. It's the Model.
Cloud-first platforms have an inherent tension built into their design: convenience requires centralization, and centralization creates blast radius. When a single vendor's infrastructure is compromised, every institution and individual that trusted them is exposed simultaneously. The attack surface isn't just one school's server — it's every school that ever uploaded a document, sent a message, or stored a record on that platform.
This isn't a novel observation. It's the same pattern that repeats after every breach of this type. A vendor collects data from thousands of organizations, stores it in a way that makes operations efficient, and in doing so creates exactly the kind of high-value, centralized repository that sophisticated attackers look for.
For most people in most situations, this is an acceptable tradeoff. For people with elevated privacy needs — journalists, researchers, attorneys, clinicians, activists, anyone whose files carry serious real-world consequences — the tradeoff isn't acceptable at all.
Zero-Trust Isn't a Buzzword. It's an Architecture.
The Canvas breach illustrates why the zero-trust philosophy matters beyond corporate IT talking points. If a system is designed such that even the vendor cannot access your data, a breach of the vendor's infrastructure yields nothing useful to an attacker. The keys aren't there. The plaintext isn't there. The architecture itself is the protection.
UltraLocked is built around exactly this principle. Cryptographic keys are generated and stored inside Apple's Secure Enclave — a dedicated hardware chip physically incapable of exporting those keys to the main processor, to the app, or to anyone else. UltraLocked's developers cannot access vault contents. A server-side breach of any infrastructure connected to the app would yield nothing, because the meaningful secrets never leave the device.
That offline-first, hardware-anchored design is a direct architectural response to the class of vulnerability that events like the Canvas hack expose. The files aren't on a vendor's server waiting to be found. They're encrypted at the hardware level on a device the user controls.
What Happens When You Need to Move Files
One objection to offline-first storage is always portability. If data never touches the cloud, how does it move between devices or people? The Canvas model implicitly offers an answer: centralize everything, and movement becomes trivial. The cost, obviously, is what we're discussing.
UltraLocked offers two answers that don't require that tradeoff. The encrypted export format — a .ultralocked bundle secured with Argon2id key derivation and AES-256-GCM encryption — can travel over any channel: AirDrop, Files, email. The bundle is already sealed before it touches any transport layer. Even if intercepted, the contents are inaccessible without the passphrase, and the KDF parameters are calibrated to make brute force genuinely expensive.
For in-person transfers where no network contact is acceptable at all, the air-gapped QR transfer protocol works entirely in airplane mode. Two devices exchange encrypted data optically, with a Short Authentication String verification step to prevent interception. No network permissions required. No data ever transmitted over any infrastructure a third party controls.
Neither approach is frictionless in the way cloud sync is frictionless. That's an honest tradeoff, not a flaw. The question is what you're optimizing for.
The Forward-Looking Problem
The Canvas incident won't be the last breach of a major educational or institutional platform. The incentives that created this architecture — scale, convenience, vendor control — haven't changed. What's changing is the sophistication and frequency of attacks against these centralized repositories.
For the broader population, the answer probably involves pushing vendors to improve their security practices, enforce better encryption at rest, and adopt more rigorous access controls. Those are legitimate demands.
For users whose privacy needs sit outside the mainstream — people whose exposure carries professional, legal, or personal risk — waiting for vendors to get better isn't a strategy. The architectural separation between "data I control" and "data hosted on someone else's infrastructure" is the only reliable defense. Hardware-level key protection, offline-first storage, and ephemeral transfers don't just reduce risk. They eliminate entire categories of it.
The Canvas hack is a data point in a pattern. The pattern is that centralized trust fails. For users who can't afford to learn that lesson the hard way, the architecture needs to assume breach from the start.