Zero-knowledge Β· Blockchain-anchored Β· AES-256-GCM

Your Files.
Your Keys.
Your Proof.

SecureCrypt encrypts on your device before anything uploads. Every share, access, and revocation is signed and recorded on an immutable blockchain - giving you cryptographic proof of who touched what and when.

$4.88M Average cost of a data breach - IBM 2024
AES-256-GCM Authenticated encryption - every file, every time
Zero-knowledge Server stores only ciphertext - no keys, no plaintext
On-chain proof RSA-signed audit trail - immutable and independently verifiable
Zero-Knowledge Encryption

Your keys never leave your device

Files are encrypted on your machine before anything is uploaded. The server receives only ciphertext - it has no access to your keys, your filenames, or the contents of your files. Neither do we.

  • AES-256-GCM with a random 96-bit IV per file
  • Argon2id key derivation - resistant to GPU and ASIC brute-force
  • Original filenames and extensions encrypted inside the container
  • No backdoor key. No master key escrow. Ever.
Technical deep-dive β†’
Blockchain Audit Trail

Every action, permanently recorded

Every share, access, and revocation is signed with your RSA private key and committed to a CometBFT blockchain. The ledger is append-only - no entry can be quietly edited or deleted after finalization.

  • RSA-SHA256 signature per transaction - non-repudiation by design
  • Block height, tx hash, and key fingerprint on every entry
  • Client independently re-verifies every entry it reads
  • Export as PDF, CSV, or JSON for compliance submissions
Read the audit trail docs β†’
Cryptographic Sharing

Share with proof. Revoke with certainty.

When you share a file, its decryption password is encrypted with the recipient's RSA-2048 public key - fetched and verified on-chain. Only their private key can unwrap it. No shared links, no email passwords, no trust assumptions.

  • Recipient's public key fingerprint verified on-chain before every share
  • Per-share symmetric key - one compromise doesn't affect other files
  • Revocation recorded on-chain and enforced immediately
  • Optional expiry date per share
Read the sharing guide β†’
Who it's for

Built for professionals who can't afford a breach

SecureCrypt is purpose-built for the people who handle other people's most sensitive information - and are legally accountable for it.

βš–οΈ
Legal & Compliance

Lawyers & Law Firms

Attorney-client privilege can be challenged if privileged files are stored on systems where a third party holds the keys. Standard cloud storage can't prove chain of custody for discovery.

Blockchain audit trail exportable for discovery proceedings. Zero-knowledge means even SecureCrypt cannot be compelled to produce your plaintext. Cryptographic proof of every share event.

πŸ“Š
Financial Services

Advisors & Accountants

SEC cybersecurity rules require demonstrable encryption and access controls. Sharing tax documents and financial models over email is a compliance liability that grows with every client added.

RSA-signed transaction log per client file maps directly to SEC audit requirements. Instant revocation closes access the moment an engagement ends. PDF compliance export in one click.

πŸ₯
Healthcare & HIPAA

Clinicians & Practices

Healthcare breaches averaged $9.77M in 2024 - the highest of any industry for the 14th consecutive year. Patient records handled outside the EHR often land in unencrypted email attachments or consumer cloud storage.

AES-256-GCM before any data leaves the device. Server holds only ciphertext. Audit log with timestamps and access records maps directly to HIPAA Β§164.312(b) access logging requirements.

How we compare

Not all "secure" storage is equal

Most cloud storage encrypts in transit and at rest - but the service holds the keys. SecureCrypt occupies a different category: verifiable file security.

Feature Dropbox / Google Drive Tresorit / Icedrive SecureCrypt
Client-side encryption before upload βœ• βœ“ βœ“
Zero-knowledge (server has no key) βœ• βœ“ βœ“
Blockchain-anchored audit trail βœ• βœ• βœ“
Independently verifiable audit log βœ• βœ• βœ“
RSA-signed transaction per operation βœ• βœ• βœ“
Instant on-chain access revocation βœ• Partial βœ“
Exportable cryptographic proof (PDF / CSV) βœ• βœ• βœ“
Free tier with full encryption βœ“ βœ• βœ“
Trust model

What you don't have to trust

SecureCrypt is designed so that your security does not depend on trusting any single party - including us.

βœ“
Not the storage backend Cloud storage holds only ciphertext. It has no key material and cannot decrypt your files under any circumstances.
βœ“
Not the chain operator Entries are RSA-signed by the sender. A compromised validator cannot forge a valid signature or alter finalized entries.
βœ“
Not us SecureCrypt has no backdoor key. We cannot decrypt your files or impersonate your identity - even under a court order.
βœ“
Not the network Files are encrypted before upload. An in-transit attacker sees only ciphertext - TLS is a second layer, not the only layer.
βœ“
Not the recipient's client Revocation is recorded on-chain and checked before any download. A malicious client cannot bypass an on-chain revoke.

Start protecting your files today

Free forever. No credit card required. Your keys are yours from minute one.