F
D
B
D
E
B
B
D
F
B
D
A
1
A
D
0
B
B
E
A
C
D
F
1
B
A
D
0
1
C
1
E
F
1
A
D
A
B
F
C
0
B
1
E
A
E
F
C
C
B
E
0
F
1
D
B
F
D
1
0
F
E
1
B
0
B
A
A
C
D
A
B
E
E
B
F
A
D
D
E
Optional Zero-Knowledge Layer

Mathematical
Privacy.

Standard encryption protects you from hackers. The Iron Vault protects you from us. We physically cannot read your data because we do not hold the keys.

Works with Free Accounts

Choose Your Threat Model.

We don't believe in a one-size-fits-all approach to privacy. We offer two distinct synchronization models so you can balance convenience with absolute security.

Standard Sync

Convenience First

Perfect for most operatives. Your data is encrypted at rest on our secure EU servers, and we manage the keys.

  • Encrypted in transit and at rest.
  • Password recovery available via email.
  • ×IronTasks has technical ability to decrypt.

The Iron Vault

Zero Knowledge

For those who demand mathematical privacy. Your data is encrypted on your device before it syncs. We store the safe, but only you hold the key.

  • Client-side AES-GCM-256 encryption.
  • We physically cannot read your tasks.
  • !No password recovery. If you lose your keys, data is lost forever.

How the Vault Works.

Trust math, not promises. The cryptographic flow happens invisibly in the background.

1. The Local Key

Your device generates a unique, uncrackable master key. It never leaves your phone or computer.

2. Password Lock

Your master key is then locked inside a secure vault using your personal password.

3. The Scramble

Before syncing, your tasks and notes are scrambled into unreadable text using AES-256.

4. Blind Cloud

We receive the scrambled text. Without your password, we have zero ability to read your data.

Session Security.

Your decryption keys live securely in volatile RAM. Set an auto-lock timer to automatically purge them when you step away from your desk.

Vault Locked

Provide authorization to decrypt session.

••••••••••••
Decrypt

The Master Key.

Because we cannot reset your password, you are issued a cryptographic recovery key upon initialization. Save it offline. Keep it safe.

Recovery Protocol
SAVE OFFLINE
ey7A-k9Lp-2mXq-9f2x-88a2-4c91-b3f2-MasterKey
AES-256-GCM Print & Store

Advanced Security.

Tools designed for operatives who take their operational security seriously.

Master Recovery Key

Upon initialization, you are provided a cryptographic Master Key. Print it out. Put it in a safe. If you lose your password, this is the only way to recover your life.

Auto-Lock Timeout

Walk away from your desk with peace of mind. Set an inactivity timer that automatically purges your decryption keys from active memory until you return.

Remote Kill Switch

Lost your phone? Log into the web terminal and hit the Kill Switch. It instantly invalidates all active sessions across all devices, securing your vault.

Vanguard Access

Ready to forge your workflow?

Join the waitlist today. Get early access to the web beta and secure your Founder's Pack before public launch.

Free Local Tier Zero-Knowledge No Spam