Decentralized Password Management
Your Data.
Your Devices.
Fully Encrypted.
Some things are not for the cloud.
True privacy through local-first, peer-to-peer password management.
Why?
Security-First Approach
Our users are security-savvy individuals who refuse to entrust their passwords to third-party servers. Local storage eliminates the exposure risks of cloud-hosted vaults by keeping everything on devices you control.
Uncompromised Independence
Centralized services can be compromised, shut down, or coerced, cutting off access to your own data. By removing our company as a potential failure point, you gain uninterrupted access and ironclad privacy.
What?
Zero-Knowledge Architecture
Encryption and decryption occur only on your devices-no master keys ever transit our servers.
WebRTC P2P Sync
We leverage WebRTC's ICE framework for direct, encrypted peer-to-peer synchronization without storing any vault data centrally.
Transparent Relay
For networks where direct peer-to-peer connectivity fails, we transparently relay traffic through TURN servers to maintain sync.
Optional Signaling
An optional hosted signaling service removes the need to self-host Signaling/STUN/TURN infrastructure.
How?
Local Vault Creation
You initialize your encrypted vault on your device; a strong master password derives the encryption key locally.
Peer Discovery & Signaling
Devices exchange connection info via STUN/TURN to negotiate a direct WebRTC link; signaling only facilitates connection setup, not data exchange.
Direct Encrypted Sync
Once peers are connected, vault changes replicate over an encrypted P2P channel, ensuring data never touches third-party servers.
Automatic Relay Fallback
If a direct link can't form, we seamlessly switch to TURN relays so your devices stay in sync, even across restrictive networks.
Resilient Independence
No matter our company's status, your existing devices will continue syncing peer-to-peer without interruption.