Sovereign AI Memory

Your Data. Your Keys. Your Control.

Military-grade encryption with zero server contact. All operations execute in your browser.

πŸ’Ύ Memory Storage

Encrypt sensitive data with your passphrase. Keys are derived locally using PBKDF2 with 100,000 iterations.

πŸ”“ Memory Retrieval

Decrypt stored memories using your passphrase. Integrity verification confirms data authenticity.

Encrypted Vault

No encrypted memories yet. Store one above first.

βš™οΈ Advanced Features

Memory Versioning

Store multiple encrypted versions of the same memory. Each version maintains independent encryption and history tracking.

Version Control Features:
β€’ Automatic timestamp on each version
β€’ Independent encryption keys per version
β€’ Rollback to any previous version
β€’ Audit trail with modification timestamps
β€’ Version branching for alternative histories

Current Memory Versions: 0

Time-Locked Memories

Encrypt memories that cannot be decrypted before a specified time. Useful for scheduled reveals, future communications, or delayed attestations.

Time-Lock Benefits:
β€’ Cryptographic time verification
β€’ Client-side timestamp validation
β€’ No server involvement in unlock logic
β€’ Decryption key derived with temporal binding
β€’ Useful for scheduled data reveals

Auto-Expiring Memories

Create memories that expire after a set number of decryptions or a time period. Perfect for ephemeral data and sensitive temporary information.

Expiry Features:
β€’ Access counter stored with encrypted data
β€’ Time-based expiration support
β€’ No server tracking required
β€’ Automatic invalidation after expiry
β€’ Useful for one-time secrets & OTPs

πŸ“‘ Network Monitor

Live monitoring shows zero outgoing requests during all cryptographic operations. Your data never leaves your device.

Outgoing Requests (Encryption Ops) 0
Data Transmitted to Server 0 bytes
Client-Side Operations 0
Server Contact Events 0
Monitor Status ● LIVE

πŸ›‘οΈ Sovereignty Proof

Complete cryptographic assurance that your data remains under your control. Every operation is transparent and verifiable.

βœ“

All Operations Execute in Your Browser

No server involvement. Encryption, key derivation, and decryption happen exclusively on your device using the Web Crypto API.

βœ“

No Data Transmitted to Any Server

Your plaintext memories never leave your device. Only encrypted ciphertext can exist outside your browser, and only with your consent.

βœ“

Keys Derived From Your Passphrase Only

Using PBKDF2 with 100,000 iterations and SHA-256. No master keys, no key escrow, no backdoors. Your passphrase is the sole source of cryptographic entropy.

βœ“

AES-256-GCM Encryption Standard

Military-grade authenticated encryption. Provides both confidentiality and authenticity guarantees for your data.

βœ“

Cryptographically Verifiable Integrity

Content hashes using SHA-256 allow you to verify that decrypted data matches the original without modification.

πŸ—οΈ Architecture Overview

Client-Side Boundary

Your Browser (Secure Enclave)

  • Password/Passphrase Input
  • PBKDF2 Key Derivation (100k iterations)
  • AES-256-GCM Encryption
  • SHA-256 Hashing
  • IV Generation (random 96-bit)
  • Authentication Tag Verification
  • All Cryptographic Operations
↓ Encrypted Data Only ↓

Local Storage / Export

  • Encrypted Ciphertext (hex)
  • IV (hex)
  • Salt (hex)
  • Content Hash
  • Timestamps
Key Principle: No passphrase, plaintext, or derived keys ever leave your browser. Complete sovereignty guaranteed.