Security Architecture
VaultBridge is designed so files remain private, encrypted, and outside direct platform control. Trust is enforced by system design, not just policy text.
Core Security Principles
Client-Side Encryption
Files are encrypted in the browser before transfer. Raw file payloads are never uploaded in plaintext.
Zero-Knowledge Architecture
VaultBridge cannot decrypt file contents because decryption keys are generated and retained client-side.
Temporary Storage
Vault payloads are short-lived by default and are removed after lifecycle conditions are met.
Minimal Data Collection
No account is required for core flows and no behavioral profiling is performed for product usage.
Architecture Overview
Encryption occurs at the client boundary. Infrastructure only receives encrypted payloads and lifecycle metadata.
[Client Browser] | (Encrypt + key derivation) v [TLS 1.3 Transport] | v [VaultBridge API] | stores encrypted chunks + TTL metadata v [Ephemeral Storage Layer] | v [Recipient Browser Decrypts Locally]
Key Generation Process
- 01Generate per-session entropy in browser runtime.
- 02Derive encryption material from access factors (e.g., code + random salt).
- 03Use symmetric encryption for payload chunks (AES-256 class model).
- 04Store only encrypted payload and lifecycle metadata server-side.
- 05Discard runtime key material once transfer/decryption flow ends.
File Lifecycle
Encryption Model
Data Retention Policy
VaultBridge does not permanently store files. Vault data is removed after expiration or destruction events. The platform is optimized for temporary transfer, not long-term archives.
Auto-Destruct Logic
- Time-based expiration is enforced via TTL metadata.
- Burn-on-read deletes vaults after configured successful retrievals.
- Manual destruction invalidates active access immediately.
- Cleanup workers remove expired artifacts from storage.
What VaultBridge Cannot Do
- Read file contents in plaintext
- Decrypt encrypted payloads without user-held key material
- Build user identity profiles from account systems
- Retain files indefinitely outside configured lifecycle controls
Transparency statement: privacy guarantees are architecture-driven. Operational policy follows the constraints established by the system design.
Privacy by Architecture
Explore the reasoning and product philosophy behind these technical choices.