Deterministic Security Hub
Combine multiple random sources to generate your unique master seed. This process is fully local and deterministic.
Vault is hidden for security.
Active: personal
ID: 000000
Visual Seed Fingerprint
Deterministic passwords derived from your seed.
Deterministic memorable phrase.
Workflow: Select → Encrypt → Download. To restore: Select Encrypted File → Decrypt.
1. Select image → 2. Enter message → 3. Encode → 4. Download
Upload a PNG to extract hidden data.
Export your identity for offline storage.
Restore your vault from a 64-char hex seed.
Split your seed into two parts. Both are required to restore.
Export your full vault state (seed, notes, context) as an encrypted bundle.
Entropy Vault is a 100% offline, deterministic security hub. It uses your unique entropy (images, audio) to generate a master seed, which then derives all your passwords, identities, and encryption keys. No data ever leaves your device.
Entropy → SHA-256 → Master Seed → PBKDF2 → AES-GCM. Every output is mathematically tied to your initial entropy. This ensures that as long as you have your entropy sources, you have your vault.
Zero trackers. Zero uploads. Zero cloud. Your security is enforced by local math, not a remote server. The application is designed to be fully functional even in an air-gapped environment.
The same input always produces the same output. This allows you to "reconstruct" your entire digital security profile from just your master seed or original entropy sources.
Transparency is security. Entropy Vault is built with open-source cryptographic standards and the code is fully auditable by the community.
1. Data Collection: Entropy Vault does not collect, store, or transmit any personal data, seeds, or files. All data processing occurs locally within your browser's memory.
2. Local Storage: If you use the "Save Encrypted" feature for notes, the data is stored in your browser's localStorage, encrypted with a key derived from your master seed. This data never leaves your device.
3. Third-Party Services: We do not use any third-party analytics, tracking cookies, or external APIs. The application is completely self-contained.
4. Security: While we use industry-standard cryptographic practices, the security of your vault ultimately depends on the strength of your entropy and the physical security of your device.
1. Acceptance: By using Entropy Vault, you agree to these terms. If you do not agree, do not use the application.
2. No Warranty: This software is provided "as is" without any warranty of any kind, express or implied. Use at your own risk.
3. Responsibility: You are solely responsible for the management and backup of your master seed and entropy sources. Loss of these will result in permanent loss of access to your vault.
4. Limitation of Liability: In no event shall the authors or copyright holders be liable for any claim, damages, or other liability arising from the use of this software.
MIT License Copyright (c) 2026 Entropy Vault Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Idea by: sahildh3
Programming by: Google AI Studio
Designed & Developed by: sahildh3
Powered by: Web Crypto API & Lucide Icons
Core Technologies: Web Crypto API, Canvas API, MediaDevices API.
Algorithms: AES-GCM (256-bit), PBKDF2 (SHA-256), SHA-256, HMAC-SHA-256.
Wordlist: Memorability-focused English wordlist for deterministic passphrase generation.
1. Data Collection: Entropy Vault does not collect, store, or transmit any personal data, seeds, or files. All data processing occurs locally within your browser's memory.
2. Local Storage: If you use the "Save Encrypted" feature for notes, the data is stored in your browser's localStorage, encrypted with a key derived from your master seed. This data never leaves your device.
3. Third-Party Services: We do not use any third-party analytics, tracking cookies, or external APIs. The application is completely self-contained.
4. Security: While we use industry-standard cryptographic practices, the security of your vault ultimately depends on the strength of your entropy and the physical security of your device.
1. Acceptance: By using Entropy Vault, you agree to these terms. If you do not agree, do not use the application.
2. No Warranty: This software is provided "as is" without any warranty of any kind, express or implied. Use at your own risk.
3. Responsibility: You are solely responsible for the management and backup of your master seed and entropy sources. Loss of these will result in permanent loss of access to your vault.
4. Limitation of Liability: In no event shall the authors or copyright holders be liable for any claim, damages, or other liability arising from the use of this software.