Offline iPhone vaultfor seed phrases
Store seed phrases, private keys, and other high-risk files with Secure Enclave-backed protection. No cloud sync. No accounts. No server access.
Seed phrases protected
Built for high-risk secrets, not convenience
UltraLocked is designed for people protecting recovery phrases, wallet backups, private keys, and other sensitive files that should never depend on cloud sync or software-only storage.
Built for recovery material that should not live in Notes, Photos, cloud backups, or convenience-first vaults.
Seed phrases and private keys
Validate BIP-39 phrases, control reveal timing, and protect against coercion with duress mode.
Sensitive notes and documents
Store high-risk text and files locally with hardware-backed protection anchored to your iPhone.
Travel and seizure scenarios
Use decoy access, self-destruct timers, and dead man's switch when compromise is a real possibility.
Why UltraLocked is different
Most apps optimize for convenience: cloud sync, account recovery, and cross-device access. UltraLocked makes the opposite tradeoff. Your files stay on your device. Your keys stay protected by Secure Enclave. There are no servers to breach, subpoena, or misconfigure.
Cloud storage
Easy to access, but exposed to account compromise and server-side risk.
Software vaults
Better than plain notes, but still rely on software-managed keys.
UltraLocked
Offline by default, Secure Enclave-backed protection, and built-in coercion safeguards.
The protections that matter when compromise is real
Secure Enclave-backed vault
Keys are generated and protected by Apple's dedicated security hardware. They never exist in software or memory.
Crypto secret protection
Store seed phrases and private keys with BIP-39 validation, Shamir recovery, and delayed reveal.
Duress and destruction workflows
Use a secondary PIN for decoy access, schedule self-destruct timers, or auto-wipe after missed check-ins.
Duress code
Opens a decoy vault under coercion while protecting your real data.
Dead man's switch
Automatically wipe the vault if you fail to check in.
Self-destruct timers
Destroy files after hours, days, or weeks.
Tamper detection
Detects jailbreaking, screen recording, and surveillance. Triggers automatic security responses.
Built first for self-custody
UltraLocked is not a general-purpose file manager. It is built for users who prioritize local control over convenience.
That means:
- No cloud sync
- No account system
- No remote recovery
- No server-side access
If you want cross-device convenience, UltraLocked is the wrong tool. If you want high-risk secrets kept local and hardware-protected, that is exactly what it is for.
Crypto Secrets Vault
Hardware-encrypted storage for seed phrases and private keys. Split secrets with Shamir backup so you can lose a share and still recover.
2 of 3 shares needed to recover. Lose one, still safe.
BIP-39 Validated
Full 2,048-word validation with checksum verification. Supports 12, 18, and 24-word phrases. Auto-complete suggestions as you type.
Shamir Secret Sharing
Split secrets into multiple shares. Default 2-of-3 threshold means you can lose one share and still recover. Export as QR codes or printable PDFs.
Reveal Delays
Configure mandatory delays before viewing secrets. From instant to 24 hours. Tap-to-reveal shows one word at a time with auto-hide timers.
Threat-Aware Reveal
Automatically blocks reveals when threats detected: screen recording, AirPlay, debugger attached, or duress mode active.
Duress Protection
Under coercion? Your duress PIN shows convincing decoy seeds while silently wiping real secrets. Plausible deniability built in.
Supported Formats
12, 18, or 24-word BIP-39 mnemonics with checksum validation
Hex, 0x-prefixed, WIF, and Base58Check formats auto-detected
Air-Gapped File Transfer
Transfer encrypted files between devices using only camera and screen. No WiFi, no Bluetooth, no network—just light.
Zero Network
Works in airplane mode. No WiFi, Bluetooth, or cellular needed.
MITM Protection
Verbal SAS verification. Both users confirm a 6-character code out loud.
Fountain Coding
Handles 50%+ missed scans automatically. No retransmission needed.
End-to-End Encrypted
P-256 ECDH key exchange. AES-256-GCM per frame. Ephemeral keys destroyed after.
How It Works
Both devices scan each other's QR codes
Confirm 6-character code matches verbally
Animated QR codes stream the encrypted file
File appears in receiver's vault
How Hardware Security Works
Understanding the technology that makes your files physically impossible to decrypt.
Your Security Chip Does the Heavy Lifting
Your device has a dedicated security co-processor called the Secure Enclave. This hardware chip:
- Generates encryption keys that never leave the chip
Keys exist only in hardware, never in memory or software
- Performs all encryption operations internally
Your files never touch unencrypted memory
- Cannot be accessed by apps, OS, or even Apple
Physical isolation from the main processor
Show Technical Details →Hide Technical Details ↑
- Key Generation: Elliptic Curve (P-256)
- Key Agreement: ECDH with HKDF derivation
- Encryption: AES-256-GCM authenticated
Your Device
Each file encrypted with a unique key
Every File Gets Its Own Unique Key
Unlike traditional vaults with a single master password, UltraLocked uses Perfect Forward Secrecy:
- Each file encrypted with a unique, ephemeral key
Generated fresh for every file, never reused
- Compromising one file provides zero advantage
No cryptographic relationship between file keys
100% Offline. No Servers. No Accounts.
UltraLocked contains zero networking code. Your files never leave your device:
- No data ever leaves your device
Complete local storage, no cloud sync
- No servers to hack or subpoena
Zero infrastructure means zero attack surface
- No analytics, tracking, or telemetry
We don't know who you are or what you store
No Servers
No Cloud
Your Device Only
How UltraLocked Compares
Direct comparison with professional cloud storage and password managers. We make deliberate trade-offs for maximum security.
| Feature | UltraLocked(Hardware-Based) | Cloud StorageDropbox, Box, OneDrive | Password Managers1Password, LastPass |
|---|---|---|---|
| Root of Trust | Hardware (Secure Enclave) | Software / Cloud Service | Software Password |
| Key Storage | Hardware Chip (Non-extractable) | Server or Device RAM | Device Storage |
| Per-File Unique Keys | |||
| Network Access Required | Optional | ||
| Company Can Access Data | Physically Impossible | Yes | Yes (if cloud enabled) |
| Plausible Deniability | |||
| Dead Man's Switch | |||
| Forensic Resistance | High | Low-Medium | Low |
| Works 100% Offline | |||
| Cross-Device Sync | Varies | ||
| Recovery After Device Loss | Varies |
Root of Trust
Key Storage
Per-File Unique Keys
Network Access Required
Company Can Access Data
Plausible Deniability
Dead Man's Switch
Forensic Resistance
Works 100% Offline
Cross-Device Sync
Recovery After Device Loss
Our Philosophy: UltraLocked makes deliberate trade-offs, prioritizing security over convenience. We believe true privacy requires accepting that not all data can be recovered if you lose your device.
Pricing
7-day free trial. Premium unlocks unlimited storage, crypto vault, secure capture, and coercion-resistance features.
Premium
For professionals handling confidential information
$29.99
/monthor $299/year (save $60)
7-day free trial • No credit card required
- Hardware-anchored encryption (Secure Enclave)
- Secure camera & encrypted notes
- Self-destruct timers & Dead Man's Switch
- Duress code & emergency protocols
- Unlimited files and storage
- Priority email support
Enterprise
For teams and organizations with compliance requirements
Custom
Contact for pricing
Volume discounts available
- Apple Business Manager deployment
- Volume licensing
- Centralized billing
- Dedicated support
- Custom security policies
- All Premium features included
Frequently Asked Questions
Common questions about hardware security, privacy, and how UltraLocked works.
Your encryption keys are generated and stored inside your device's Secure Enclave - a dedicated security chip that's physically isolated from the main processor.
These keys are non-extractable by design. They cannot be read by software, backed up to iCloud, or recovered by Apple, law enforcement, or even us. This isn't a bug - it's the foundation of hardware-anchored security.
The trade-off: Maximum security means accepting that data loss is permanent if you lose your device or forget your PIN. For sensitive data, we believe this is the right choice.
Still have questions?
Protect seed phrases offline
Secure Enclave-backed protection with no cloud sync, no accounts, and no server access.
Available on App Store
Offline iPhone vault for seed phrases and high-risk files. 7-day free trial, then $29.99/month.
Hardware-protected • 100% Offline • Zero Analytics
Our Promise: We take your privacy as seriously as we take file security. Your data never leaves your device, and we collect zero analytics.