PDF Security: Passwords, Encryption, Redaction, and What Actually Protects Your Data

PDF offers multiple security mechanisms, but they're widely misunderstood. An "owner password" that prevents printing can be removed in seconds, while a "user password" with AES-256 is essentially unbreakable. This guide explains what actually protects your data.

Two Types of PDF Passwords

PDFs support two distinct passwords, each with very different security properties:

FeatureUser Password (Open Password)Owner Password (Permissions Password)
What it doesPrevents opening the PDF entirelyRestricts actions (print, copy, edit) but allows viewing
Security levelStrong — content is encryptedWeak — content is NOT encrypted in older formats
Can be bypassed?Only by brute-force or knowing the passwordTrivially removed by many tools
Use caseConfidential documents that must not be viewed without authorizationDiscouraging casual copying/printing (not security)
⚠️ Critical insight: An owner-only password does not encrypt the document content when using older encryption (40-bit RC4 or 128-bit RC4). The PDF viewer simply checks a flag and hides the "Print" button. Anyone with a basic PDF library can ignore this flag and access the full content.

PDF Encryption Algorithms

PDF has used several encryption algorithms over its history:

AlgorithmPDF VersionKey LengthCurrent Status
RC4PDF 1.1+40-bit❌ Completely broken — crackable in seconds
RC4PDF 1.4+128-bit⚠️ Weak — feasible attacks exist, not recommended
AESPDF 1.6+128-bit✅ Secure for most purposes
AESPDF 2.0256-bit✅ Strong — current best practice

When setting a user password, always choose AES-256 if your tool supports it. If you must use an older format, AES-128 is the minimum acceptable level.

Redaction: Removing Sensitive Content

Redaction is the permanent removal of content from a PDF. Done wrong, it's a security disaster. Done right, it's irreversible.

What Proper Redaction Does

  • Permanently removes the text or image from the PDF's internal data streams
  • Replaces the redacted area with a solid black (or colored) rectangle
  • Removes the underlying character data so copy/paste and search return nothing
  • Strips the content from document metadata and any associated XMP data

What Fake "Redaction" Looks Like

These common mistakes look like redaction but leave the original content fully intact:

  • Black highlight — using a highlight annotation in black. The text is still there underneath; select-all + copy reveals it.
  • Black rectangle annotation — drawing a shape on top. The original content is untouched in the page stream.
  • Black text box overlay — adding a text box filled with black. Removing the annotation reveals everything.
  • Screenshot and paste — taking a screenshot and pasting it over the sensitive area. If the original still exists in the layer below, it can be extracted.
💡 Real-world failures: In 2014, a US government filing used black rectangles over classified content — which anyone could copy/paste to expose. In 2019, Paul Manafort's lawyers filed a "redacted" PDF to court where selecting text revealed the hidden content. Always verify redaction by trying to select/copy the redacted area.

Digital Signatures

A digital signature proves two things:

  1. Authentication — the signer is who they claim to be (verified through a certificate chain).
  2. Integrity — the document hasn't been modified since it was signed (cryptographic hash verification).

Key facts about PDF digital signatures:

  • They cover a specific byte range of the PDF — any modification (even adding a comment) invalidates them.
  • Multiple signatures are supported — each covers the state of the document at the time it was signed.
  • They are NOT encryption — a signed PDF is still readable by anyone. Signing provides proof, not confidentiality.
  • Merging, splitting, rotating, or watermarking a signed PDF always invalidates the signature.

Watermarks as Security

Watermarks serve a deterrent function, not a security function:

  • Visible watermarks — text like "CONFIDENTIAL" or "DRAFT" across the page. These discourage casual sharing and help identify leaked documents, but can be removed by anyone with a PDF editor.
  • Dynamic watermarks — include the recipient's name or email in the watermark, so leaked copies can be traced back. More effective for accountability than prevention.
  • Invisible watermarks — hidden data in the document structure for forensic tracking. Sophisticated but not standardized in PDF.

Security Best Practices

  • ✅ Use user passwords + AES-256 for confidential documents
  • ✅ Use proper redaction tools — not black rectangles or highlights
  • Verify redaction by opening the redacted PDF in a text editor and searching for removed content
  • ✅ Apply digital signatures after all other edits (merge, rotate, watermark) are complete
  • ✅ Use strong passwords — at least 12 characters with mixed case, numbers, and symbols
  • ❌ Don't rely on owner passwords for actual security
  • ❌ Don't use 40-bit or 128-bit RC4 encryption
  • ❌ Don't assume a watermark prevents copying
  • ❌ Don't skip verification before sharing redacted documents

Summary

ProtectionPurposeStrength
User password + AES-256Prevent unauthorized openingStrong
Owner passwordDiscourage printing/copyingWeak (easily bypassed)
Proper redactionPermanently remove sensitive contentStrong (irreversible)
Digital signatureProve authenticity and integrityStrong
WatermarkDeterrent and leak tracingWeak (removable)

Frequently Asked Questions

A user password (open password) prevents anyone without it from opening the PDF at all — the content is encrypted. An owner password (permissions password) restricts actions like printing, copying, or editing but does not encrypt the content. Owner passwords can be easily bypassed with free tools, so they offer no real security.
Yes. AES-256 is the same encryption standard used by governments and banks. With a strong password (12+ characters, mixed case, numbers, symbols), an AES-256 encrypted PDF is effectively unbreakable with current technology.
Only if the redaction was done improperly. Drawing a black rectangle over text does not remove it — the text is still there and can be selected and copied. Proper redaction tools permanently delete the underlying text and replace it with a blank area. Always use a dedicated redaction feature, not just drawing tools.
Digital signatures don’t prevent modification, but they detect it. If a signed PDF is altered, the signature becomes invalid, alerting the recipient that the document has been tampered with. Always sign a PDF as the final step after all edits are complete.
No. Watermarks are a deterrent and can help trace leaked copies, but they don’t prevent copying. Watermarks can be removed with various tools. For real protection, use user password encryption (AES-256) to prevent unauthorized access entirely.

Need to add a watermark or protect your PDF?

Open Watermark Tool →