Sovereign AI Memory
Your Data. Your Keys. Your Control.
Military-grade encryption with zero server contact. All operations execute in your browser.
πΎ Memory Storage
Encrypt sensitive data with your passphrase. Keys are derived locally using PBKDF2 with 100,000 iterations.
π Memory Retrieval
Decrypt stored memories using your passphrase. Integrity verification confirms data authenticity.
Encrypted Vault
βοΈ Advanced Features
Memory Versioning
Store multiple encrypted versions of the same memory. Each version maintains independent encryption and history tracking.
β’ Automatic timestamp on each version
β’ Independent encryption keys per version
β’ Rollback to any previous version
β’ Audit trail with modification timestamps
β’ Version branching for alternative histories
Current Memory Versions: 0
Time-Locked Memories
Encrypt memories that cannot be decrypted before a specified time. Useful for scheduled reveals, future communications, or delayed attestations.
β’ Cryptographic time verification
β’ Client-side timestamp validation
β’ No server involvement in unlock logic
β’ Decryption key derived with temporal binding
β’ Useful for scheduled data reveals
Auto-Expiring Memories
Create memories that expire after a set number of decryptions or a time period. Perfect for ephemeral data and sensitive temporary information.
β’ Access counter stored with encrypted data
β’ Time-based expiration support
β’ No server tracking required
β’ Automatic invalidation after expiry
β’ Useful for one-time secrets & OTPs
Encrypted Search
Search through decrypted memories without ever storing plaintext. Results are never logged or transmitted.
β’ No plaintext stored during search
β’ Search index never created on server
β’ Local pattern matching only
β’ Results computed in-browser
β’ Zero external network requests
π‘ Network Monitor
Live monitoring shows zero outgoing requests during all cryptographic operations. Your data never leaves your device.
π‘οΈ Sovereignty Proof
Complete cryptographic assurance that your data remains under your control. Every operation is transparent and verifiable.
All Operations Execute in Your Browser
No server involvement. Encryption, key derivation, and decryption happen exclusively on your device using the Web Crypto API.
No Data Transmitted to Any Server
Your plaintext memories never leave your device. Only encrypted ciphertext can exist outside your browser, and only with your consent.
Keys Derived From Your Passphrase Only
Using PBKDF2 with 100,000 iterations and SHA-256. No master keys, no key escrow, no backdoors. Your passphrase is the sole source of cryptographic entropy.
AES-256-GCM Encryption Standard
Military-grade authenticated encryption. Provides both confidentiality and authenticity guarantees for your data.
Cryptographically Verifiable Integrity
Content hashes using SHA-256 allow you to verify that decrypted data matches the original without modification.
ποΈ Architecture Overview
Client-Side Boundary
Your Browser (Secure Enclave)
- Password/Passphrase Input
- PBKDF2 Key Derivation (100k iterations)
- AES-256-GCM Encryption
- SHA-256 Hashing
- IV Generation (random 96-bit)
- Authentication Tag Verification
- All Cryptographic Operations
Local Storage / Export
- Encrypted Ciphertext (hex)
- IV (hex)
- Salt (hex)
- Content Hash
- Timestamps