Key features: - 3-layer architecture: decoy/hidden/panic - Cryptographically indistinguishable layers (like VeraCrypt hidden volumes) - Client-side XChaCha20-Poly1305 encryption - IPFS decentralized storage - RAM-only key storage (forensics-resistant) - 100% free, open source
Real use cases: journalists protecting sources, activists in authoritarian regimes, crypto holders preventing theft.
Tech stack: Next.js 15, Cloudflare Pages/D1, @noble/ciphers, IPFS (Pinata/Filebase)
teycirb•17h ago
Key features: - 3-layer architecture: decoy/hidden/panic - Cryptographically indistinguishable layers (like VeraCrypt hidden volumes) - Client-side XChaCha20-Poly1305 encryption - IPFS decentralized storage - RAM-only key storage (forensics-resistant) - 100% free, open source
Real use cases: journalists protecting sources, activists in authoritarian regimes, crypto holders preventing theft.
Tech stack: Next.js 15, Cloudflare Pages/D1, @noble/ciphers, IPFS (Pinata/Filebase)