ENCRYPTION
AES-GCM-256
Every credential is encrypted with AES-GCM-256 before storage. The same cipher trusted by military and intelligence agencies worldwide.
SYS_STABILITY: 100%
ENC_PROTOCOL: AES-GCM-256
NODE_REGION: UNKNOWN
LINK_ESTABLISHED
ZERO_KNOWLEDGE_ARCHITECTURE_V.4.0.1
A password vault where the server is structurally incapable of reading your data. Your secrets are encrypted before they ever leave your device.
SYSTEM_CAPABILITIES
ENCRYPTION
Every credential is encrypted with AES-GCM-256 before storage. The same cipher trusted by military and intelligence agencies worldwide.
ARCHITECTURE
The server holds only ciphertext. Without your master key, the data is mathematically indistinguishable from random noise.
KEY_DERIVATION
Your master password is never transmitted. It derives a local encryption key via 600,000 PBKDF2 iterations with SHA-512.
PRIVACY
The backend processes only opaque blobs. No plaintext, no metadata, no behavioral analytics. Structural privacy by design.
EXECUTION
All cryptographic operations run inside your browser or native client. The network sees only encrypted payloads.
RESILIENCE
Generate a recovery key that encrypts your master key client-side. If you lose your password, recover your vault without the server ever seeing the key.
TRANSPARENCY
The encryption protocol is fully documented and open source. Verify every claim independently. No security through obscurity.
ZERO_KNOWLEDGE_PROTOCOL
KEY_DERIVATION
You enter your master password. PBKDF2-SHA512 with 600k iterations derives an encryption key locally. The raw password is immediately discarded from memory.
CLIENT_SIDE_ENCRYPTION
Your vault entries are encrypted with AES-GCM-256 in your browser before any network call is made. The server receives only ciphertext and an authentication tag.
DOUBLE_LAYER_ENCRYPTION
The server applies its own AES-GCM-256 encryption on top of your already-encrypted data. Even if the database leaks, attackers face two independent encryption layers.
RECOVERY_KEY
Generate a recovery key stored only by you. It encrypts your master key client-side and sends the opaque blob to the server. Lost your password? Decrypt locally with the recovery key — the server never sees it.
CRYPTOGRAPHIC_PARAMETERS
AUDIT_CHECKLIST
THREAT_MODEL
Even if the server infrastructure is fully compromised, attackers face two independent encryption layers. Without your master password, brute-forcing 600k PBKDF2 iterations per attempt is computationally infeasible. Recovery keys are encrypted client-side — the server stores only opaque blobs it cannot read.
BEGIN_SECURE_SESSION
No subscriptions. No tracking. No backdoors. Zero-knowledge architecture means we are structurally incapable of accessing your vault — not just legally prohibited.
INPUT_MASTER_HASH