Veilith employs cutting-edge cryptographic protocols and innovative security mechanisms to ensure your data remains protected against even the most sophisticated adversaries.
Multiple layers of security ensure that even if one layer is compromised, your data remains protected by numerous additional safeguards.
State-of-the-art encryption algorithms provide the foundation of our security model.
Plausible deniability through sophisticated data hiding techniques.
Hide encrypted vaults within innocent-looking images.
Deep dive into the technical security measures that protect your data at every level.
Winner of the Password Hashing Competition, Argon2ID provides state-of-the-art protection against password cracking attempts.
Algorithm: Argon2ID v1.3
Memory: 64 MB (Interactive)
Iterations: 3
Parallelism: 4
Output: 256-bit keys
Each device generates a unique integrity key stored in the iOS Keychain, preventing cross-device access even if passwords are compromised.
A modern AEAD cipher providing both confidentiality and authenticity with exceptional performance.
Cipher: XChaCha20 (256-bit key)
MAC: Poly1305 (128-bit tag)
Nonce: 192-bit (24 bytes)
Block Size: 8192 bytes
Mode: AEAD (Authenticated Encryption)
Every vault is protected with HMAC to detect tampering or corruption.
Our unique implementation provides true plausible deniability through sophisticated data organization.
Ensures file integrity and device binding
Fixed-size array containing both real and fake salts
Mix of encrypted data and random padding
Real encrypted blocks are cryptographically indistinguishable from random padding blocks.
All decryption attempts check every salt and block to prevent timing attacks.
Encrypted blocks are placed at cryptographically random positions within the file.
Advanced image steganography hides encrypted vaults in plain sight.
Vaults are compressed using zlib before embedding to maximize capacity.
Algorithm: DEFLATE (zlib)
Level: Default (6)
Ratio: ~40-60% typical
Data is hidden in the least significant bits of RGB channels.
Channels: RGB (skip alpha)
Bits/pixel: 3
Capacity: W×H×3 bits
Large vaults can be distributed across multiple cover images.
Chunk size: 200KB
Auto-split: Yes
Reassembly: Automatic
Encrypted Vault
Compression
LSB Embedding
Beyond encryption, Veilith implements numerous security best practices.
Sensitive data is securely zeroed after use using memset_s to prevent memory analysis attacks.
Emergency passwords instantly overwrite vaults with cryptographically secure random data.
All random values are generated using libsodium's cryptographically secure RNG.
Constant-time operations ensure decryption attempts don't leak information through timing.
Device-specific keys prevent synchronization, ensuring data never leaves your device unintentionally.
Device integrity is recalculated during import, maintaining security across device transfers.
Our security implementation has been thoroughly reviewed and meets industry standards.
Algorithms meet NIST recommendations for post-quantum security
Follows OWASP mobile security best practices
Leverages iOS Keychain and Secure Enclave when available
Protected by device-specific keys and destruction capabilities
Deniable encryption provides plausible deniability
No cloud sync ensures data never leaves device
Join security-conscious professionals who trust Veilith for their most sensitive information.