Zero-knowledge password manager with client-side encryption. Your data is encrypted on your device before it ever leaves it. The server never sees your passwords.
Everything you need to manage your passwords securely, with nothing you don't.
Your master password never leaves your device. The server stores only encrypted data it cannot read. Even if our database is breached, your passwords remain safe.
All encryption and decryption happens in your browser using Web Workers. AES-256-GCM with Argon2id key derivation (64MB memory, 3 iterations) ensures military-grade protection.
Create multiple vaults with folders to organize your passwords, TOTP codes, secure notes, files, and website bookmarks. Everything in one place.
Protect your account with TOTP authenticator apps, email verification, or hardware security keys via WebAuthn. Multiple layers of defense.
Access your vault from any device. Changes sync automatically across browsers and desktop apps. Offline mode keeps you productive without internet.
Don't trust any server? Use local mode. Your encrypted vault lives entirely on your device with zero network requests. Full privacy, zero compromise.
Security you can understand, not just trust.
Your master password is the only key to your vault. It never leaves your device and is never sent to our server in any form.
Your master password is used to derive an encryption key via Argon2id (64MB memory cost). All data is encrypted with AES-256-GCM before leaving your browser.
The server receives and stores only encrypted blobs. It has no way to decrypt your data, verify your master password, or recover your vault.
When you log in, encrypted data is downloaded and decrypted locally using your master password. The process runs in an isolated Web Worker for maximum security.
An attacker would get AES-256-GCM encrypted blobs. Without your master password, brute-forcing the encryption is computationally infeasible.
Unlike some password managers, we never store any hash of your master password. There is nothing for an attacker to run dictionary attacks against.
Each decryption attempt requires 64MB of memory and significant CPU time. Mass brute-forcing is impractical even with specialized hardware.
Use it in your browser or download the native app for your platform.