Create a vault
Name it.
Set a password.
A 256-bit vault key is generated locally. It is wrapped with your password using PBKDF2 + HKDF and stored encrypted on-device. The key never leaves. Not for setup, not ever.
Connect a provider
Choose your
cloud backend.
S3, OneDrive, Dropbox, Azure Blob, WebDAV, Google Drive, pCloud, MinIO — configure via OAuth or credentials. Provider secrets are encrypted with the vault key before storage. The vault key never leaves the device.
Upload a file
Encrypt locally.
Upload ciphertext.
Files are encrypted with AES-256-GCM on-device before any network request. The cloud provider receives only ciphertext — no plaintext, no metadata that reveals content. Authentication on every request is DPoP-bound to your device key.
Access anywhere
Download.
Decrypt on demand.
Files are downloaded and decrypted in memory when you open them. Temporary local copies are managed by the Zero Trust TTL sweep — unpinned files are automatically removed after the configured timeout. Nothing lingers on-device.