UltraLocked
Hardware-Protected Digital Vault

Professional File Securitywith Hardware Protection

Secure client files, sensitive documents, and confidential information with hardware-level encryption. Built for professionals who can't afford data breaches.

HIPAA-Level Protection
100% Offline
Hardware Keys Only
Download on the App Store
3 Files Encrypted
Hardware-protected
2 Timers Active
Auto-delete scheduled
Dead Man's Switch
72 hours remaining

Built for People Who Can't Afford Data Breaches

Hardware-level security for professionals where confidentiality isn't optional.

Crypto Holders

Seed phrases and private keys worth protecting

  • Seed phrase storage with Shamir backup
  • Private keys in hardware-encrypted vault
  • Duress codes show decoy wallets

Legal Professionals

Attorney-client privilege is non-negotiable

  • Case files and witness interviews
  • Settlement documents
  • Discovery materials

Healthcare Providers

HIPAA compliance and patient trust

  • Patient records and images
  • Consultation notes
  • Research data

Executives

Fiduciary duty and insider trading compliance

  • M&A and due diligence
  • Board materials
  • Competitive intelligence

High-Risk Individuals

When device seizure is a real threat

  • Journalists protecting sources
  • International travelers
  • Security researchers

Not For Everyone

Security over convenience

  • No cross-device sync
  • No PIN recovery
  • No cloud backup

Why Professional File Security Requires Hardware, Not Just Software

Client files, patient records, and business intelligence deserve better than software-only encryption and cloud storage you have to trust.

Cloud-Based Vaults

  • Subject to subpoenas and data breaches
  • Companies can access confidential data
  • Subject to foreign jurisdictions
  • Compliance risks with data residency laws

Software-Only Encryption

  • Keys stored in device memory
  • Vulnerable to malware and forensic tools
  • Single master key compromises all files
  • Extractable with sufficient access

Hardware-Anchored Security

  • Keys never leave security chip
  • Physically impossible to extract
  • Each file gets unique key
  • Meets highest security standards for confidential data

Three Pillars of Hardware Security

Professional-grade protection for files that can't afford to leak.

Hardware-Encrypted Vault

Files protected by the same Secure Enclave chip that guards Apple Pay. Keys exist only in hardware—impossible to extract.

  • Secure Enclave encryption
  • Perfect Forward Secrecy
  • Zero analytics tracking

Self-Destruct Timers

Files automatically delete after your chosen timeframe. When they're gone, they're really gone—no recovery possible.

  • Flexible timing (5min-custom)
  • Secure deletion
  • Visual countdown

Dead Man's Switch

Auto-wipe if you don't check in. Essential when traveling internationally or facing situations where access could be demanded.

  • Configurable time limits
  • Automatic vault destruction
  • Offline queue protection

Store Any File Type

Hardware-encrypted storage for all your sensitive files with automatic metadata stripping.

📄

Documents

PDF, DOC, TXT

📷

Photos

PNG, JPEG, HEIC

🎬

Videos

MP4, MOV

🎙️

Audio

M4A, MP3

📝

Notes

Secure text

Advanced Protection

Multiple layers of defense against physical and digital threats.

Secure Enclave

Keys generated and stored in Apple's tamper-resistant chip. They never exist in software or memory.

Duress Codes

Alternative PIN opens a decoy vault while silently destroying real data. Plausible deniability built in.

Memory Protection

Anti-debugging, secure memory clearing, and runtime self-protection against forensic extraction.

Tamper Detection

Detects jailbreaking, screen recording, and surveillance equipment. Triggers automatic security responses.

What We Never Do

No Cloud

Files never leave your device

No AI

We don't scan your content

No Analytics

Zero usage tracking

No Data Mining

Nothing harvested or sold

Crypto Secrets Vault

Hardware-encrypted storage for seed phrases and private keys. Split secrets with Shamir backup so you can lose a share and still recover.

24-Word Seed Phrase
1.••••
2.••••
3.••••
4.••••
5.••••
6.••••
7.••••
8.••••
9.••••
10.••••
11.••••
12.••••
13.••••
14.••••
15.••••
16.••••
17.••••
18.••••
19.••••
20.••••
21.••••
22.••••
23.••••
24.••••
1
Local
2
Backup
3
Backup

2 of 3 shares needed to recover. Lose one, still safe.

BIP-39 Validated

Full 2,048-word validation with checksum verification. Supports 12, 18, and 24-word phrases. Auto-complete suggestions as you type.

Shamir Secret Sharing

Split secrets into multiple shares. Default 2-of-3 threshold means you can lose one share and still recover. Export as QR codes or printable PDFs.

Reveal Delays

Configure mandatory delays before viewing secrets. From instant to 24 hours. Tap-to-reveal shows one word at a time with auto-hide timers.

Threat-Aware Reveal

Automatically blocks reveals when threats detected: screen recording, AirPlay, debugger attached, or duress mode active.

Duress Protection

Under coercion? Your duress PIN shows convincing decoy seeds while silently wiping real secrets. Plausible deniability built in.

Supported Formats

Seed Phrases

12, 18, or 24-word BIP-39 mnemonics with checksum validation

Private Keys

Hex, 0x-prefixed, WIF, and Base58Check formats auto-detected

Air-Gapped File Transfer

Transfer encrypted files between devices using only camera and screen. No WiFi, no Bluetooth, no network—just light.

Sender
No Network
Pure Optical
Received
Receiver

Zero Network

Works in airplane mode. No WiFi, Bluetooth, or cellular needed.

MITM Protection

Verbal SAS verification. Both users confirm a 6-character code out loud.

Fountain Coding

Handles 50%+ missed scans automatically. No retransmission needed.

End-to-End Encrypted

P-256 ECDH key exchange. AES-256-GCM per frame. Ephemeral keys destroyed after.

How It Works

1
Key Exchange

Both devices scan each other's QR codes

2
Verify

Confirm 6-character code matches verbally

3
Transfer

Animated QR codes stream the encrypted file

4
Complete

File appears in receiver's vault

How Hardware Security Works

Understanding the technology that makes your files physically impossible to decrypt.

Hardware Layer

Your Security Chip Does the Heavy Lifting

Your device has a dedicated security co-processor called the Secure Enclave. This hardware chip:

  • Generates encryption keys that never leave the chip

    Keys exist only in hardware, never in memory or software

  • Performs all encryption operations internally

    Your files never touch unencrypted memory

  • Cannot be accessed by apps, OS, or even Apple

    Physical isolation from the main processor

Show Technical Details →
  • Key Generation: Elliptic Curve (P-256)
  • Key Agreement: ECDH with HKDF derivation
  • Encryption: AES-256-GCM authenticated

Your Device

Secure Enclave
Keys In
Locked

Each file encrypted with a unique key

Cryptographic Layer

Every File Gets Its Own Unique Key

Unlike traditional vaults with a single master password, UltraLocked uses Perfect Forward Secrecy:

  • Each file encrypted with a unique, ephemeral key

    Generated fresh for every file, never reused

  • Compromising one file provides zero advantage

    No cryptographic relationship between file keys

Privacy Layer

100% Offline. No Servers. No Accounts.

UltraLocked contains zero networking code. Your files never leave your device:

  • No data ever leaves your device

    Complete local storage, no cloud sync

  • No servers to hack or subpoena

    Zero infrastructure means zero attack surface

  • No analytics, tracking, or telemetry

    We don't know who you are or what you store

No Servers

No Cloud

Your Device Only

How UltraLocked Compares

Direct comparison with professional cloud storage and password managers. We make deliberate trade-offs for maximum security.

Root of Trust

UltraLockedHardware (Secure Enclave)
Cloud VaultsSoftware / Cloud Service
Photo VaultsSoftware Password

Key Storage

UltraLockedHardware Chip (Non-extractable)
Cloud VaultsServer or Device RAM
Photo VaultsDevice Storage

Per-File Unique Keys

UltraLocked
Cloud Vaults
Photo Vaults

Network Access Required

UltraLocked
Cloud Vaults
Photo VaultsOptional

Company Can Access Data

UltraLockedPhysically Impossible
Cloud VaultsYes
Photo VaultsYes (if cloud enabled)

Plausible Deniability

UltraLocked
Cloud Vaults
Photo Vaults

Dead Man's Switch

UltraLocked
Cloud Vaults
Photo Vaults

Forensic Resistance

UltraLockedHigh
Cloud VaultsLow-Medium
Photo VaultsLow

Works 100% Offline

UltraLocked
Cloud Vaults
Photo Vaults

Cross-Device Sync

UltraLocked
Cloud Vaults
Photo VaultsVaries

Recovery After Device Loss

UltraLocked
Cloud Vaults
Photo VaultsVaries

Our Philosophy: UltraLocked makes deliberate trade-offs, prioritizing security over convenience. We believe true privacy requires accepting that not all data can be recovered if you lose your device.

Professional Security Pricing

7-day free trial, then subscribe. Built for professionals who can't afford data breaches.

Premium

For professionals handling confidential information

$29.99

/month

or $299/year (save $60)

7-day free trial • No credit card required

  • Hardware-anchored encryption (Secure Enclave)
  • Secure camera & encrypted notes
  • Self-destruct timers & Dead Man's Switch
  • Duress code & emergency protocols
  • Unlimited files and storage
  • Priority email support
Start Free Trial

Enterprise

For teams and organizations with compliance requirements

Custom

Contact for pricing

Volume discounts available

  • Apple Business Manager deployment
  • Volume licensing
  • Centralized billing
  • Dedicated support
  • Custom security policies
  • All Premium features included
Contact Sales

Frequently Asked Questions

Common questions about hardware security, privacy, and how UltraLocked works.

Your encryption keys are generated and stored inside your device's Secure Enclave - a dedicated security chip that's physically isolated from the main processor.

These keys are non-extractable by design. They cannot be read by software, backed up to iCloud, or recovered by Apple, law enforcement, or even us. This isn't a bug - it's the foundation of hardware-anchored security.

The trade-off: Maximum security means accepting that data loss is permanent if you lose your device or forget your PIN. For sensitive data, we believe this is the right choice.

Ready for professional-grade file security?

Hardware-protected encryption for professionals who can't afford data breaches.

Hardware
Protected
iOS
App Store
Zero
Analytics

Available on App Store

Hardware-protected file security for professionals. 7-day free trial, then $29.99/month.

7-Day Free Trial
$29.99/month
HIPAA-Level Security

Hardware-protected • 100% Offline • Zero Analytics

Our Promise: We take your privacy as seriously as we take file security. Your data never leaves your device, and we collect zero analytics.