Why We're Building VaultKeepR — Our Vision for Password Security
Why We're Building VaultKeepR
Every project starts with a frustration. Ours started with a question: why does every password manager require you to trust a company with your most sensitive data?
The Moment It Clicked
The LastPass breach of 2022-2023 was a wake-up call for the entire security industry. Not because the encryption was broken — it wasn't. But because millions of encrypted vaults were stolen from centralized servers, and users with weak master passwords became sitting targets for offline brute-force attacks.
The security community's response was predictable: "Use a stronger master password." "Enable 2FA." "Switch to [competitor]."
But we asked a different question: Why were all those vaults stored in one place to begin with?
The Core Insight
Every major password manager — LastPass, 1Password, Bitwarden, Dashlane — uses the same fundamental architecture: encrypt client-side, store on company servers. It's a solid model, but it creates an inherent trade-off:
Strong encryption ──────────────── Centralized storage
↕ ↕
Your side is secure Their side is a target
The encryption might be perfect. But the availability, persistence, and control of your vault depends entirely on a company's infrastructure, policies, and continued existence.
We thought: what if we could keep the strong encryption but remove the centralized storage? What if your vault lived on a protocol, not a server?
The Three Pillars
VaultKeepR was designed around three principles:
1. Zero-Knowledge (For Real)
"Zero-knowledge" is marketing for most password managers. Yes, they encrypt client-side. But they still:
- Require your email (identity)
- Store your encrypted vault (target)
- Control your recovery mechanism (access)
- Know when and how often you sync (metadata)
VaultKeepR's zero-knowledge extends beyond encryption:
- No email required — wallet address is your identity
- No centralized vault storage — IPFS is your backend
- No company-controlled recovery — Shamir fragments, you distribute them
- Minimal metadata — we store only wallet address → CID mapping
2. Self-Sovereignty
Your passwords are yours. This means:
- You control the encryption keys — derived from your master password + wallet
- You control the vault location — IPFS, pinned by you if you want
- You control recovery — Shamir shares, distributed by you
- You can leave — export to CSV/JSON anytime, no lock-in
The trade-off is responsibility. If you lose your master password and your wallet and your Shamir shares, no one can help you. This is by design.
3. Cryptographic Trust, Not Corporate Trust
Traditional password managers ask you to trust their:
- Server security
- Employee access controls
- Data handling policies
- Legal compliance in their jurisdiction
- Business continuity plans
VaultKeepR asks you to trust:
- XChaCha20-Poly1305 (proven, open-standard cipher)
- Argon2id (PHC winner, academic consensus)
- IPFS (open protocol, content-addressed)
- EIP-191 (Ethereum standard, widely implemented)
We believe mathematics and open protocols are more reliable trust anchors than corporate promises.
What We've Built
The Stack
| Component | Technology | Why |
|---|---|---|
| Encryption | XChaCha20-Poly1305 + Argon2id | State-of-the-art, constant-time, memory-hard |
| Storage | IPFS via Storacha | Decentralized, content-addressed, persistent |
| Authentication | EIP-191 wallet signatures | Cryptographic proof, no shared secrets |
| Recovery | Shamir Secret Sharing (3-of-5) | Distributed trust, no single point of failure |
| TOTP | RFC 6238 implementation | Standards-compliant 2FA |
| Email aliases | @vaultkeepr.xyz forwarding | Privacy-preserving identity |
The Platforms
- Web App — Full vault management at app.vaultkeepr.xyz
- Chrome Extension — Autofill, auto-save, quick access
- iOS App — Native SwiftUI with AutoFill integration
- Core Library — Open-source
@vault-keeper/corefor cryptographic operations
Where We're Going
Short-Term (Next 3 Months)
- Firefox extension — Second browser platform
- Android app — Native Kotlin implementation
- Third-party security audit — Formal verification of cryptographic implementation
- Passkey support — FIDO2/WebAuthn alongside wallet auth
Medium-Term (6-12 Months)
- Team vaults — Shared encrypted storage with role-based access
- Hardware wallet integration — Ledger/Trezor for key signing
- Zero-knowledge proofs — For selective credential sharing
Long-Term (Vision)
We believe the future of personal data management is:
- Decentralized — No company controls your data
- Interoperable — Open protocols, not proprietary ecosystems
- User-sovereign — You own and control everything
- Provably secure — Verified by math and open-source code, not trust
VaultKeepR is a password manager today. Tomorrow, it could be the foundation for how you manage all your digital identity.
Join Us
VaultKeepR is in active development. The core product is live, and we're building in public. You can:
- Try VaultKeepR — Free to use at vaultkeepr.xyz
- Read the code — Core crypto library is open-source on GitHub
- Join the conversation — Follow us on X for updates
- Join our community — Connect on Telegram for discussions
Keep Reading
- What Is a Zero-Knowledge Password Manager?
- The Case for Decentralized Password Storage
- Wallet-Based Authentication Explained
We're building the password manager we wished existed. No compromises on privacy. No compromises on security. No compromises on ownership.
Welcome to VaultKeepR. Your keys. Your vault. Your rules.
Ready to take control of your passwords?
VaultKeepR is the first decentralized password manager. Zero-knowledge. Wallet-native. Yours.
Try VaultKeepR →