All data stays on your device. Exported files are encrypted and can only be opened with your master password.

Security Architecture

How Privacy Vault protects your credentials : from key derivation to auto-lock. Everything is designed so that trust in us is mathematically unnecessary.

AES-GCM 256-bit Encryption

Every vault entry is encrypted using AES-GCM with a 256-bit key before it is ever written to storage. AES-GCM provides both confidentiality and authenticity; any tampering with the ciphertext causes decryption to fail cleanly.

PBKDF2 Key Derivation

Your master password is never used directly as an encryption key. PBKDF2-SHA256 with 210,000 iterations and a random 16-byte salt is used to derive a strong key. This makes brute-force attacks computationally expensive.

IndexedDB Local Storage

Encrypted vault data lives in your browser's IndexedDB, a sandboxed local database. Other websites cannot access it. When you close the browser, it remains encrypted at rest on your disk.

Auto-Lock After Inactivity

The decrypted vault is kept only in memory. After 5 minutes of inactivity, the vault is automatically wiped from memory. Your master password is never stored, not in localStorage, cookies, or anywhere else.

Encrypted Portable Backups

Exported backup files use the same AES-GCM encryption. The file is useless without your master password. Even if someone intercepts or steals the backup file, they cannot read it.

Zero Server-Side Access

All cryptographic operations happen in your browser using the native Web Crypto API. We never receive your passwords, master password, or any vault data. This is an architectural guarantee, not a policy promise.