Deniability-oriented design
Decoy vault for plausible data
Hidden vaults without "talkative" markers
Minimal metadata about vault count
ChromVoid keeps secrets on your computer or on your phone, not in someone else's cloud. That gives you a smaller attack surface and a security model that is easier to reason about if you do not want to trust cloud storage with your secrets.
No subscription. Public repo, architecture diagrams, protocol specs.
Decoy vault for plausible data
Hidden vaults without "talkative" markers
Minimal metadata about vault count
Phone can act as the source of truth
Secure Enclave / TEE protects keys
Desktop stays a thin client
Noise over all channels (USB/WebRTC/WSS)
PIN/QR-pairing, then mutual authentication
Capability grants — minimal permissions
16KB chunk encryption (ChaCha20-Poly1305)
AAD = chunk name (swap protection)
Sharded catalog + delta sync
Storage pepper kept separately (OS keystore)
Simply "copying the folder" is not enough
Argon2id memory-hard KDF
Free — basic security
Pro = convenience/scale/LDL
Lifetime license per device
Desktop or Mobile — the same Rust Core inside.
macOS, Windows, Linux, iOS, AndroidLocal mode — Core is built-in. Mobile host — phone as source of truth (USB cable or WebRTC/WSS).
Start local, switch to Mobile host later if neededPIN or QR code. The device is remembered, a secure channel is activated.
Noise protocol over USBDecoy vault for "regular" accounts. Main vault — under a different password.
Different passwords, separate accessBrowser extension communicates only with localhost. No secret storage.
Zero-cache policyImportant: ChromVoid does not "send your vault to the cloud". Secrets stay with you: locally or on your phone.
Both modes use the same Core. The choice depends on where you want the source of truth to live: on this device or on your phone.
No hardware, fast, autonomous
Phone — source of truth (Secure Enclave / TEE)
Standard cryptographic primitives and documented architecture. No "military-grade" — only verifiable solutions.
When you're forced to "open everything", cryptography is no longer the only line of defense.
Cloud and accounts expand the attack surface and create risk of centralized incidents.
A wrong password often leaves a clear signal: the system reveals a "marker" about data existence.
Too many solutions are tied to subscriptions and require constant network access.
ChromVoid is opinionated on purpose: local-first storage, less cloud trust, and deniability-oriented UX are responses to real constraints, not marketing decoration.
The basic version is free. Pro features are purchased once: LDL — forever for selected devices.
For personal use and most scenarios
For high-risk threat model
Why isn't security in Pro?
Encryption, KDF, and basic security architecture are not sold separately. Pro is about scaling and convenience, not "paying for security".
A "decoy vault + hidden vaults" model. You can show one vault under coercion. ChromVoid minimizes signs that anything else exists. Limitations depend on the threat model — they are described in the Threat Model.
Yes. In Mobile host mode, the phone is the source of truth with hardware key protection (Secure Enclave / TEE). Desktop connects as a thin client via USB cable (no network) or via WebRTC/WSS (over network).
Yes, if your workflow is folder-based. Mounted Vault is the public path for notes and files on desktop. It is not a first-party Obsidian plugin; it is an encrypted mounted folder workflow.
Open Mounted Vault pageYes. Local mode works on Desktop and Mobile. If you want the phone to hold the secrets, use Mobile host mode.
Yes, through Credential Provider integrations on supported platforms. The important limit is that the provider path remains local-only and requires an open vault instead of background cloud access.
Open Credential Provider pageChromVoid uses memory-hard KDF (Argon2id) and an "offline-hardening" approach: part of the material is stored separately (e.g., in OS keystore). This makes offline brute-force harder even with a data copy.
The extension connects only to the local Desktop Gateway (127.0.0.1) and communicates via a secure channel (Noise). Secrets are not stored in the extension — this is the zero-cache policy.
Open Browser Extension pageVault password cannot be recovered. This is a "security-first" tradeoff. Use a passphrase (4–5 words) and store the recovery sheet in a safe place.
No. If the device is compromised while the vault is open, any password manager is at risk. ChromVoid reduces risk but does not replace basic security hygiene.
LDL — Lifetime Device License. The purchase is tied to a device (Core) and is valid "forever for this device". Security updates with no time limit.
If your threat model includes coercion, seizures, or high compromise risk — ChromVoid is built exactly for that.
No subscription. Deniability depends on the threat model — limitations are publicly described.