All Guides
Security8 min read · March 2025

PDF Security: Passwords, Encryption, and Watermarking Explained

Every organization handles documents that shouldn't be seen by unauthorized eyes — contracts, financial reports, personal data, intellectual property. PDFs offer several layers of security, but they're only effective when you understand what each layer does and doesn't protect.

The Two Types of PDF Passwords

Most people treat PDF password protection as a single feature, but the PDF specification actually defines two distinct password types with completely different purposes. Confusing them leads to serious security gaps.

User Password (Open Password)

This password is required to open and view the document at all. Anyone without it sees nothing. This is the correct choice when the content itself is sensitive — medical records, legal contracts, personnel files. The document remains encrypted on disk; the password decrypts it at open time.

Owner Password (Permissions Password)

This password controls what viewers can do with a document they can already open. It can restrict printing, copying text, annotating, or editing form fields. The document content is visible to anyone, but certain actions are locked. Important: this protection is enforced by the reader application, not the file itself — determined users can bypass it with available software tools.

PDF Encryption: What AES-256 Actually Means

When you apply a user password to a PDF, the document is encrypted using a cipher algorithm. Older PDFs used 40-bit RC4 encryption, which is now trivially broken. Modern PDF files (PDF 1.6 and above) use AES-128 or AES-256 encryption — the same standard used by governments and financial institutions worldwide.

AES-256 means the encryption key is 256 bits long. A brute-force attack trying every possible key combination would require more computational time than the age of the universe with all computers on Earth working in parallel. In practical terms: a strong password with AES-256 encryption makes your PDF unreadable to anyone without the password, full stop.

The weak point is never the encryption — it's the password itself. A PDF protected with the password "123456" or the document's own filename can be cracked in milliseconds using dictionary attacks. Always use long, random passwords and share them through a different channel than the document (for example, send the PDF by email but share the password by phone or text message).

Permission Restrictions: What They Protect (and What They Don't)

PDF permission restrictions can limit the following actions:

  • Printing (or restricting to low-quality printing)
  • Copying or extracting text and images
  • Modifying the document content
  • Adding annotations or comments
  • Filling in form fields
  • Extracting pages for accessibility tools

Here's the critical caveat: permission restrictions rely entirely on reader compliance. Adobe Acrobat, Apple Preview, and reputable PDF readers honor these restrictions. However, PDF processing libraries and other tools can read the raw file content regardless of permission flags. If your requirement is truly preventing content access, use a user password (open password) instead. Permission restrictions are appropriate for "please don't copy this" notices, not for genuinely sensitive data protection.

Watermarking: Visible vs. Invisible

Watermarks serve a different purpose from encryption. They don't prevent access — they identify the document's origin and deter unauthorized sharing through accountability.

Visible Watermarks

Text or image overlays printed across every page. Common examples include "CONFIDENTIAL", "DRAFT", "DO NOT DISTRIBUTE", or company logos. Visible watermarks immediately communicate the document's status and make unauthorized sharing obvious. They're standard practice in legal discovery, due diligence rooms, and regulated industries.

Best practices for visible watermarks: use diagonal orientation at 45° for maximum coverage, choose opacity around 20–35% so the underlying content remains readable, position watermarks centrally on each page rather than in corners (where they can be cropped), and use consistent formatting across all documents in a set.

Invisible (Digital) Watermarks

Steganographic watermarks embed tracking data invisibly within the document content. They're used in high-security environments to trace which recipient leaked a document. Each copy distributed contains a unique invisible marker tied to the recipient's identity. This is common in media licensing, film distribution, and government document management. Implementing invisible watermarks typically requires specialized professional software beyond standard PDF tools.

Removing PDF Security: When and How

There are legitimate reasons to remove password protection from a PDF you own: the original creator is unavailable, a password has been lost (and you can prove ownership), or you're consolidating documents that no longer require protection. Password removal requires providing the correct password — you cannot "unlock" a properly encrypted file without it.

PDFBolt's unlock tool removes the open password from PDFs when you provide the correct password. The decrypted file is processed entirely in your browser — the password and document content are never transmitted over the network. This is important: cloud-based unlock services require you to upload an encrypted document and a password to a third-party server, which defeats the entire purpose of encryption.

Security Checklist for Sensitive PDF Distribution

1

Use AES-256 encryption (PDF 1.6+) for documents with sensitive content

2

Choose a strong, unique password — minimum 12 characters, mixed case, numbers, symbols

3

Share passwords through a separate communication channel

4

Add a visible watermark with recipient name for highly sensitive distribution

5

Apply permission restrictions as an additional layer, not as the sole protection

6

Keep an unencrypted master copy in a secure, access-controlled location

7

Document which password protects which file in a password manager

8

Remove protection before compressing — re-apply afterward if needed

9

Verify the recipient can open the file before the meeting where it's needed

10

Use browser-based tools to avoid uploading sensitive documents to third-party servers