How We Protect Your Data

Zero-knowledge encryption means we can't access your files — not because of a privacy policy, but because of mathematics.

Your Keys, Your Data

When you upload a file to Vaulternal, it's encrypted in your browser before it ever reaches our infrastructure. The encryption key is derived from your wallet — which only you control. We never receive, store, or have access to your plaintext files or encryption keys.

Your BrowserFiles selected locally
AES-256-GCMEncrypted client-side
Encrypted Chunks5 MB each, unique IV
Decentralized StorageArweave · IPFS
Your key never leaves the browser
No single point of failure

Encryption in Detail

Every layer of the system is designed so that only the intended recipient — with the correct key — can read your data.

Symmetric Encryption
  • AES-256-GCM (authenticated encryption)
  • 12-byte IV (96 bits), 128-bit auth tag
  • Files split into 5 MB chunks (max 1,024)
  • Per-chunk IV derived from base IV XOR chunk index
  • SHA-256 integrity hash per encrypted chunk
Asymmetric Encryption
  • secp256k1-ECIES — primary (Ethereum-native)
  • ECDH shared secret → HKDF-SHA256 → AES-256-GCM
  • Ephemeral key pairs for forward secrecy
  • HMAC-SHA256 ciphertext authentication
  • X25519 retained for legacy decryption only
Multi-Party Access
  • Each recipient gets their own encrypted file key
  • Oracle double-layer wrapping gates access
  • Owner always retains a backup key copy
  • Shamir Secret Sharing ready for social recovery
Key Management
  • BIP-39 mnemonic (12 words) → BIP-32 HD wallet
  • IndexedDB storage with session encryption
  • 15-minute TTL, auto-cleared on inactivity
  • Scrypt keystore backup (Ethereum V3 format)
  • Web Worker isolated crypto operations

Where Your Files Live

Your encrypted data is distributed across decentralized networks — no single company, server, or cloud provider can take it down.

Arweave

Permanent Storage

  • One-time payment, perpetual hosting
  • Immutable — data cannot be altered
  • Globally replicated across miners
  • Designed for 200+ year persistence

IPFS

Distributed Availability

  • Content-addressed via CID hashes
  • Peer-to-peer retrieval network
  • Pinned for guaranteed availability
  • No single server dependency

Polygon

Metadata Anchoring

  • On-chain proof of existence
  • Verifiable via block explorer
  • Tamper-proof audit trail
  • Low-cost L2 transactions

How Triggers Work

Triggers automate delivery using double-layer encryption. The oracle can verify conditions but never access your files.

Setup

Owner configures triggerInactivity, time, manual, or contacts
Payload double-encryptedsecp256k1-ECIES: oracle + recipient layers
Oracle begins monitoringWatches for trigger conditions

Activation

Conditions metOracle verifies trigger criteria
Oracle unwraps outer layerReveals inner encrypted key
Recipient receives accessNotified and granted claim link

Files are decrypted entirely in the recipient's browser. At no point does Vaulternal, the oracle, or any third party have access to plaintext data.

What We Can't Do

Zero-knowledge architecture means there are things we are mathematically unable to do — even if compelled.

We CAN doWe CANNOT do
FilesStore and deliver encrypted filesRead or access your plaintext files
KeysGenerate wallet key pairs for youAccess your private key after creation
TriggersExecute trigger logic when conditions are metOverride, bypass, or cancel triggered deliveries
RecoveryProvide keyfile and seed phrase recovery pathsRecover your data without your encryption key
ComplianceRespond to legal requests with account metadataDecrypt your files for anyone, including authorities

Security Roadmap

We build in the open. Here's what's shipped, what we're working on, and what's coming next.

Built

  • Client-side AES-256-GCM encryption
  • secp256k1-ECIES asymmetric encryption
  • Multi-party key encapsulation
  • Oracle double-layer wrapping
  • Scrypt keystore (Ethereum V3)
  • BIP-39 / BIP-32 HD wallet derivation
  • Shamir Secret Sharing infrastructure
  • Web Worker isolated crypto operations

In Progress

  • Arweave permanent storage integration
  • IPFS distributed availability
  • Polygon metadata anchoring
  • Formal security audit
  • On-chain trigger execution

Planned

  • Quantum-resistant encryption
  • Social recovery via Shamir
  • Hardware wallet support
  • Multi-sig trigger authorization
  • Open-source client libraries