Koda Vault
Zero-Knowledge Security
Your secrets,
never ours.
Your vault, your rules. We never see what's inside.
In active development
Hardware-Backed Authentication
Sign in with a YubiKey or Face ID via the Secure Enclave. Your private key never leaves the hardware chip — ECDH happens on-device.
End-to-End Encrypted
Secrets are encrypted with AES-256-GCM before upload. The server stores ciphertext only — it has no access to your passwords, notes, or keys.
Multi-Device, No Compromise
Add a new device by re-authenticating with your hardware key. Sessions are managed transparently — revoke any device in one tap.
Open Protocol
Built on standard P-256 ECDH, HKDF-SHA256, and AES-GCM. Every cryptographic operation uses auditable, well-understood primitives.