Absolute
Digital Sovereignty.

This is not a folder locker—it is a military-grade local fortress. Data at rest is sealed with AES-256-GCM. Runtime integrity is enforced by an Anti-Tamper daemon that refuses silent compromise.

Anti-forensics and zero-trust data protection for a sophisticated Python desktop environment.

Download .EXE

Version 1.0 Stable — Includes README & License

Abstract encrypted data visualization — AES-256-GCM at-rest sealing

AES-256-GCM · At-rest sealing

Local execution. Zero cloud dependency for your sealed data.

Surveillance that never sleeps.

The vault stays alive: it watches, records evidence, and alerts you when boundaries are crossed.

Laptop webcam — OpenCV captures unauthorized access attempts
REC

Intruder Capture

OpenCV-powered capture snaps photos of unauthorized access attempts—visual proof tied to real events, not guesswork.

Evidence and documents under review — visual forensics trail

Visual Forensics

A structured trail of visual and contextual evidence so you can reconstruct what happened and when.

Email notification on device — SMTP security alerts

Email Alerts

SMTP dispatch pushes critical alerts off-machine—know the moment the perimeter is tested.

Make sensitive data vanish on your terms.

Stealth storage and destruction—not just deletion, but resistance to recovery.

Digital imagery and pixels — data concealed within ordinary-looking files
Gradient pixel field — payloads hidden in image data (LSB / EOF)

LSB / EOF Steganography

Hide payloads in images using least-significant-bit and end-of-file techniques—data blended into plain sight.

Paper shredding — forensic-level secure deletion and overwrite

Forensic-Level Shredding

Overwrite before deletion to defeat casual and advanced recovery—erase like you mean it.

Trust is layered, not assumed.

Strong credentials, derived keys, and hardened settings—defense in depth at the human boundary.

Digital padlock — layered authentication

Two-Level Authentication

Stepped verification so a single mistake does not equal total exposure.

Cryptographic keys and binary data — PBKDF2 key derivation

PBKDF2 Key Generation

Keys are derived with PBKDF2—slowing brute-force and tying secrets to your passphrase.

Smartphone — multi-factor authentication for protected settings

MFA-Protected Settings

Sensitive configuration stays behind multi-factor gates—policy changes require proof, not just access.

No easy bypass. No infinite tries.

Rate limits, state that survives reboots, and sessions that end themselves—attack surface meets friction.

Cybersecurity concept — throttling brute-force and rapid attempts

Rate Limiting

Throttles rapid attempts so brute-force and spray attacks burn out before the vault does.

Server room — persistent lockdown state

Persistent Lockdown

State persists in sys_state.dat—rebooting the machine does not reboot your security posture.

Watch and time — automatic session timeout after inactivity

Auto-Session Termination

Sessions end automatically after two minutes of inactivity—open windows do not stay open forever.

Built on a modern, battle-tested stack.

End-to-end encryption with AES-GCM protects sensitive assets, while local data storage keeps files under your control. The platform combines forensic auditing, steganography workflows, and Python security tools to deliver practical, desktop-first cyber defense.

Python 3.13
PyQt6
OpenCV
SQLite3