Mathematical
Privacy.
Standard encryption protects you from hackers. The Iron Vault protects you from us. We physically cannot read your data because we do not hold the keys.
Choose Your Threat Model.
We don't believe in a one-size-fits-all approach to privacy. We offer two distinct synchronization models so you can balance convenience with absolute security.
Standard Sync
Convenience First
Perfect for most operatives. Your data is encrypted at rest on our secure EU servers, and we manage the keys.
- ✓Encrypted in transit and at rest.
- ✓Password recovery available via email.
- ×IronTasks has technical ability to decrypt.
The Iron Vault
Zero Knowledge
For those who demand mathematical privacy. Your data is encrypted on your device before it syncs. We store the safe, but only you hold the key.
- ✓Client-side AES-GCM-256 encryption.
- ✓We physically cannot read your tasks.
- !No password recovery. If you lose your keys, data is lost forever.
How the Vault Works.
Trust math, not promises. The cryptographic flow happens invisibly in the background.
1. The Local Key
Your device generates a unique, uncrackable master key. It never leaves your phone or computer.
2. Password Lock
Your master key is then locked inside a secure vault using your personal password.
3. The Scramble
Before syncing, your tasks and notes are scrambled into unreadable text using AES-256.
4. Blind Cloud
We receive the scrambled text. Without your password, we have zero ability to read your data.
Session Security.
Your decryption keys live securely in volatile RAM. Set an auto-lock timer to automatically purge them when you step away from your desk.
Vault Locked
Provide authorization to decrypt session.
The Master Key.
Because we cannot reset your password, you are issued a cryptographic recovery key upon initialization. Save it offline. Keep it safe.
ey7A-k9Lp-2mXq-9f2x-88a2-4c91-b3f2-MasterKeyAdvanced Security.
Tools designed for operatives who take their operational security seriously.
Master Recovery Key
Upon initialization, you are provided a cryptographic Master Key. Print it out. Put it in a safe. If you lose your password, this is the only way to recover your life.
Auto-Lock Timeout
Walk away from your desk with peace of mind. Set an inactivity timer that automatically purges your decryption keys from active memory until you return.
Remote Kill Switch
Lost your phone? Log into the web terminal and hit the Kill Switch. It instantly invalidates all active sessions across all devices, securing your vault.
Ready to forge
your workflow?
Join the waitlist today. Get early access to the web beta and secure your Founder's Pack before public launch.