AES-256-GCM per-file encryption.
Hardware-backed keys. Zero cloud. Zero traces.
Every feature engineered around a single principle — your data stays yours, always.
Each file gets its own unique 256-bit key, generated inside the Android Keystore. Keys never leave secure hardware. Streaming encryption means even 4GB files never sit in plaintext RAM.
Biometric + mandatory 6-digit PIN. PBKDF2-SHA256 at 100,000 iterations with a 256-bit salt unique per installation.
Shake the phone. Every key is destroyed in ~200ms. All files become irrecoverable — permanently and instantly.
Disguise as Calculator, Notes, or System Utilities. Switch icons instantly — the real app stays hidden in plain sight.
Every browse session routed through Tor. No cookies, no history, no fingerprinting. Starts fresh every time.
Share vault files to any browser on the same Wi-Fi. Zero cloud. Self-signed HTTPS. QR code pairing.
Photos and videos captured directly to the encrypted vault. The original never exists in your gallery.
Silently photographs failed unlock attempts. Stored in vault. They'll never know they were caught.
Every architectural decision starts from a threat model. No plaintext on disk. No key outside hardware. No telemetry, anywhere.
allowBackup=false. All Android extraction rules blocked. No Google Drive sync possible.// Encryption Stack User Auth (Biometric + PIN) └─▶ Android Keystore TEE / StrongBox └─▶ KeyManager AES-256, non-extractable └─▶ FileEncryptor AES-256-GCM IV: 12 bytes (random) Tag: 128-bit └─▶ *.enc on disk // Database SQLCipher └─▶ EncryptedSharedPrefs AES-256-GCM master key └─▶ encrypted metadata only // Panic Wipe KeyManager.destroyAllKeys() └─▶ Keystore entries: deleted Files: irrecoverable Time: ~200ms
Free. Open source. No accounts. No telemetry.
No subscriptions. Just encryption.