UltraLocked

Offline iPhone vaultfor seed phrases

Store seed phrases, private keys, and other high-risk files with Secure Enclave-backed protection. No cloud sync. No accounts. No server access.

Secure Enclave-backed keys
No cloud. No servers.
Duress mode and timed self-destruct

Seed phrases protected

24-word seed phrase
•••• •••• •••• ••••
2-of-3 Shamir shares
1
2
3
Duress mode
Decoy vault ready

Built for high-risk secrets, not convenience

UltraLocked is designed for people protecting recovery phrases, wallet backups, private keys, and other sensitive files that should never depend on cloud sync or software-only storage.

Built for recovery material that should not live in Notes, Photos, cloud backups, or convenience-first vaults.

Seed phrases and private keys

Validate BIP-39 phrases, control reveal timing, and protect against coercion with duress mode.

Sensitive notes and documents

Store high-risk text and files locally with hardware-backed protection anchored to your iPhone.

Travel and seizure scenarios

Use decoy access, self-destruct timers, and dead man's switch when compromise is a real possibility.

Why UltraLocked is different

Most apps optimize for convenience: cloud sync, account recovery, and cross-device access. UltraLocked makes the opposite tradeoff. Your files stay on your device. Your keys stay protected by Secure Enclave. There are no servers to breach, subpoena, or misconfigure.

Cloud storage

Easy to access, but exposed to account compromise and server-side risk.

Software vaults

Better than plain notes, but still rely on software-managed keys.

UltraLocked

Offline by default, Secure Enclave-backed protection, and built-in coercion safeguards.

The protections that matter when compromise is real

Secure Enclave-backed vault

Keys are generated and protected by Apple's dedicated security hardware. They never exist in software or memory.

Crypto secret protection

Store seed phrases and private keys with BIP-39 validation, Shamir recovery, and delayed reveal.

Duress and destruction workflows

Use a secondary PIN for decoy access, schedule self-destruct timers, or auto-wipe after missed check-ins.

Duress code

Opens a decoy vault under coercion while protecting your real data.

Dead man's switch

Automatically wipe the vault if you fail to check in.

Self-destruct timers

Destroy files after hours, days, or weeks.

Tamper detection

Detects jailbreaking, screen recording, and surveillance. Triggers automatic security responses.

Built first for self-custody

UltraLocked is not a general-purpose file manager. It is built for users who prioritize local control over convenience.

That means:

  • No cloud sync
  • No account system
  • No remote recovery
  • No server-side access

If you want cross-device convenience, UltraLocked is the wrong tool. If you want high-risk secrets kept local and hardware-protected, that is exactly what it is for.

Crypto Secrets Vault

Hardware-encrypted storage for seed phrases and private keys. Split secrets with Shamir backup so you can lose a share and still recover.

24-Word Seed Phrase
1.••••
2.••••
3.••••
4.••••
5.••••
6.••••
7.••••
8.••••
9.••••
10.••••
11.••••
12.••••
13.••••
14.••••
15.••••
16.••••
17.••••
18.••••
19.••••
20.••••
21.••••
22.••••
23.••••
24.••••
1
Local
2
Backup
3
Backup

2 of 3 shares needed to recover. Lose one, still safe.

BIP-39 Validated

Full 2,048-word validation with checksum verification. Supports 12, 18, and 24-word phrases. Auto-complete suggestions as you type.

Shamir Secret Sharing

Split secrets into multiple shares. Default 2-of-3 threshold means you can lose one share and still recover. Export as QR codes or printable PDFs.

Reveal Delays

Configure mandatory delays before viewing secrets. From instant to 24 hours. Tap-to-reveal shows one word at a time with auto-hide timers.

Threat-Aware Reveal

Automatically blocks reveals when threats detected: screen recording, AirPlay, debugger attached, or duress mode active.

Duress Protection

Under coercion? Your duress PIN shows convincing decoy seeds while silently wiping real secrets. Plausible deniability built in.

Supported Formats

Seed Phrases

12, 18, or 24-word BIP-39 mnemonics with checksum validation

Private Keys

Hex, 0x-prefixed, WIF, and Base58Check formats auto-detected

Air-Gapped File Transfer

Transfer encrypted files between devices using only camera and screen. No WiFi, no Bluetooth, no network—just light.

Sender
No Network
Pure Optical
Received
Receiver

Zero Network

Works in airplane mode. No WiFi, Bluetooth, or cellular needed.

MITM Protection

Verbal SAS verification. Both users confirm a 6-character code out loud.

Fountain Coding

Handles 50%+ missed scans automatically. No retransmission needed.

End-to-End Encrypted

P-256 ECDH key exchange. AES-256-GCM per frame. Ephemeral keys destroyed after.

How It Works

1
Key Exchange

Both devices scan each other's QR codes

2
Verify

Confirm 6-character code matches verbally

3
Transfer

Animated QR codes stream the encrypted file

4
Complete

File appears in receiver's vault

How Hardware Security Works

Understanding the technology that makes your files physically impossible to decrypt.

Hardware Layer

Your Security Chip Does the Heavy Lifting

Your device has a dedicated security co-processor called the Secure Enclave. This hardware chip:

  • Generates encryption keys that never leave the chip

    Keys exist only in hardware, never in memory or software

  • Performs all encryption operations internally

    Your files never touch unencrypted memory

  • Cannot be accessed by apps, OS, or even Apple

    Physical isolation from the main processor

Show Technical Details →
  • Key Generation: Elliptic Curve (P-256)
  • Key Agreement: ECDH with HKDF derivation
  • Encryption: AES-256-GCM authenticated

Your Device

Secure Enclave
Keys In
Locked

Each file encrypted with a unique key

Cryptographic Layer

Every File Gets Its Own Unique Key

Unlike traditional vaults with a single master password, UltraLocked uses Perfect Forward Secrecy:

  • Each file encrypted with a unique, ephemeral key

    Generated fresh for every file, never reused

  • Compromising one file provides zero advantage

    No cryptographic relationship between file keys

Privacy Layer

100% Offline. No Servers. No Accounts.

UltraLocked contains zero networking code. Your files never leave your device:

  • No data ever leaves your device

    Complete local storage, no cloud sync

  • No servers to hack or subpoena

    Zero infrastructure means zero attack surface

  • No analytics, tracking, or telemetry

    We don't know who you are or what you store

No Servers

No Cloud

Your Device Only

How UltraLocked Compares

Direct comparison with professional cloud storage and password managers. We make deliberate trade-offs for maximum security.

Root of Trust

UltraLockedHardware (Secure Enclave)
Cloud VaultsSoftware / Cloud Service
Photo VaultsSoftware Password

Key Storage

UltraLockedHardware Chip (Non-extractable)
Cloud VaultsServer or Device RAM
Photo VaultsDevice Storage

Per-File Unique Keys

UltraLocked
Cloud Vaults
Photo Vaults

Network Access Required

UltraLocked
Cloud Vaults
Photo VaultsOptional

Company Can Access Data

UltraLockedPhysically Impossible
Cloud VaultsYes
Photo VaultsYes (if cloud enabled)

Plausible Deniability

UltraLocked
Cloud Vaults
Photo Vaults

Dead Man's Switch

UltraLocked
Cloud Vaults
Photo Vaults

Forensic Resistance

UltraLockedHigh
Cloud VaultsLow-Medium
Photo VaultsLow

Works 100% Offline

UltraLocked
Cloud Vaults
Photo Vaults

Cross-Device Sync

UltraLocked
Cloud Vaults
Photo VaultsVaries

Recovery After Device Loss

UltraLocked
Cloud Vaults
Photo VaultsVaries

Our Philosophy: UltraLocked makes deliberate trade-offs, prioritizing security over convenience. We believe true privacy requires accepting that not all data can be recovered if you lose your device.

Pricing

7-day free trial. Premium unlocks unlimited storage, crypto vault, secure capture, and coercion-resistance features.

Premium

For professionals handling confidential information

$29.99

/month

or $299/year (save $60)

7-day free trial • No credit card required

  • Hardware-anchored encryption (Secure Enclave)
  • Secure camera & encrypted notes
  • Self-destruct timers & Dead Man's Switch
  • Duress code & emergency protocols
  • Unlimited files and storage
  • Priority email support
Start Free Trial

Enterprise

For teams and organizations with compliance requirements

Custom

Contact for pricing

Volume discounts available

  • Apple Business Manager deployment
  • Volume licensing
  • Centralized billing
  • Dedicated support
  • Custom security policies
  • All Premium features included
Contact Sales

Frequently Asked Questions

Common questions about hardware security, privacy, and how UltraLocked works.

Your encryption keys are generated and stored inside your device's Secure Enclave - a dedicated security chip that's physically isolated from the main processor.

These keys are non-extractable by design. They cannot be read by software, backed up to iCloud, or recovered by Apple, law enforcement, or even us. This isn't a bug - it's the foundation of hardware-anchored security.

The trade-off: Maximum security means accepting that data loss is permanent if you lose your device or forget your PIN. For sensitive data, we believe this is the right choice.

Protect seed phrases offline

Secure Enclave-backed protection with no cloud sync, no accounts, and no server access.

Hardware
Protected
iOS
App Store
Zero
Analytics

Available on App Store

Offline iPhone vault for seed phrases and high-risk files. 7-day free trial, then $29.99/month.

7-Day Free Trial
$29.99/month
Secure Enclave-backed

Hardware-protected • 100% Offline • Zero Analytics

Our Promise: We take your privacy as seriously as we take file security. Your data never leaves your device, and we collect zero analytics.