Figure 2From: Web-browser encryption of personal health information Encryption data flow. A diagram laying out how the encrypted data and the user-supplied passcode are used to decrypt the data.Back to article page