Absolute
Digital Sovereignty.
This is not a folder locker—it is a military-grade local fortress. Data at rest is sealed with AES-256-GCM. Runtime integrity is enforced by an Anti-Tamper daemon that refuses silent compromise.
Anti-forensics and zero-trust data protection for a sophisticated Python desktop environment.
Version 1.0 Stable — Includes README & License
Encryption Layer
AES-256-GCM · At-rest sealing
Active Defense
Surveillance that never sleeps.
The vault stays alive: it watches, records evidence, and alerts you when boundaries are crossed.
Intruder Capture
OpenCV-powered capture snaps photos of unauthorized access attempts—visual proof tied to real events, not guesswork.
Visual Forensics
A structured trail of visual and contextual evidence so you can reconstruct what happened and when.
Email Alerts
SMTP dispatch pushes critical alerts off-machine—know the moment the perimeter is tested.
Data Ghosting
Make sensitive data vanish on your terms.
Stealth storage and destruction—not just deletion, but resistance to recovery.
LSB / EOF Steganography
Hide payloads in images using least-significant-bit and end-of-file techniques—data blended into plain sight.
Forensic-Level Shredding
Overwrite before deletion to defeat casual and advanced recovery—erase like you mean it.
Access Control
Trust is layered, not assumed.
Strong credentials, derived keys, and hardened settings—defense in depth at the human boundary.
Two-Level Authentication
Stepped verification so a single mistake does not equal total exposure.
PBKDF2 Key Generation
Keys are derived with PBKDF2—slowing brute-force and tying secrets to your passphrase.
MFA-Protected Settings
Sensitive configuration stays behind multi-factor gates—policy changes require proof, not just access.
System Hardening
No easy bypass. No infinite tries.
Rate limits, state that survives reboots, and sessions that end themselves—attack surface meets friction.
Rate Limiting
Throttles rapid attempts so brute-force and spray attacks burn out before the vault does.
Persistent Lockdown
State persists in sys_state.dat—rebooting the machine does not reboot your security posture.
Auto-Session Termination
Sessions end automatically after two minutes of inactivity—open windows do not stay open forever.
Technical Specs
Built on a modern, battle-tested stack.
End-to-end encryption with AES-GCM protects sensitive assets, while local data storage keeps files under your control. The platform combines forensic auditing, steganography workflows, and Python security tools to deliver practical, desktop-first cyber defense.