Zero-Knowledge Encryption

We never see your data. All encryption and decryption happens in your browser using the Web Crypto API. The server stores only encrypted blobs.

AES-256-GCM

All data is encrypted with AES-256-GCM — the same standard used by governments and military organizations. Each encryption uses a unique Initialization Vector (IV).

Web Crypto API

Encryption uses the browser's native Web Crypto API — no external libraries, no JavaScript crypto implementations. Hardware-accelerated, audited, battle-tested.

Server Stores Blobs Only

The server receives and stores encrypted ciphertext. Even item names, folder names, and file metadata are encrypted. A database breach reveals nothing useful.

No Backdoors

There is no master decryption key, no admin override, no recovery mechanism. If you lose your master password, the data is permanently inaccessible. By design.

How it works

1

Key Derivation

Your master password + random salt are processed through PBKDF2 with 600,000 iterations to produce two keys: an auth key (for login) and an encryption key (for data).

2

Client-Side Encryption

The encryption key decrypts your symmetric key, which in turn decrypts your vault keys. Each vault item is encrypted with its vault's unique AES-256-GCM key.

3

Server Authentication

Only the auth key hash is sent to the server for verification. The encryption key never leaves your browser — the server cannot derive it, ever.

What "zero-knowledge" actually means

True privacy, not a promise

Zero-knowledge isn't a marketing term. It's a mathematical guarantee.

Get Started