Zero-knowledge photo and note vault for iOS with ChaCha20-Poly1305 encryption.
🌐 dro1d.org/nu11vlt.html | 📄 Technical Specs
- ChaCha20-Poly1305 encryption (256-bit keys)
- NIST SP 800-88 secure wipe (single-pass random overwrite)
- Skeleton Switch auto-wipe after configurable inactivity
- Dual archive modes: Portable (AES-256) or Secure (double encryption)
- Backup PIN for duress/plausible deniability
- Face ID/Touch ID + optional PIN authentication
- Self-destructing "Fade" storage
- Local-only storage (no cloud sync)
- On-device: ChaCha20-Poly1305 AEAD
- Archive: AES-256-GCM with Argon2id key derivation
- Keys: iOS Keychain (Secure Enclave)
✓ Physical theft, forensic recovery, unauthorized access, forced unlock, extended seizure
✗ Jailbroken devices, iOS zero-days, weak passwords
See THREAT_MODEL.md for detailed analysis.
- ARCHITECTURE.md - System architecture and data flow
- ENCRYPTION.md - Encryption implementation details
- SECURE_WIPE.md - Secure wipe process
- SKELETON_SWITCH.md - Auto-wipe system
- BACKUP_PIN.md - Plausible deniability feature
- THREAT_MODEL.md - Complete threat assessment
- COMPARISONS.md - Nu11VLT vs alternatives
- FAQ.md - Frequently asked questions
- ChaCha20-Poly1305: IETF RFC 8439
- AES-256-GCM: NIST FIPS 197
- Argon2id: RFC 9106
- Secure Wipe: NIST SP 800-88 Rev. 1
iOS 18.0+
Copyright © 2025-2026. All rights reserved.
This repository contains documentation only. Source code is proprietary.