Skip to content

UnoLock VaultX Security

Overview

UnoLock VaultX is the Receive Address + Drop Client system for anonymous messaging. Recipients create a Receive Address inside their Safe, then share the address (or a shareable link). Senders use the VaultX Drop Client with no account to deliver encrypted payloads. The result is anonymous intake without account creation or identity linkage, designed for high-risk environments and first-contact safety.

How It Works

  • Hashed addressing: Receive Addresses are hashed client-side and sent as vaultxAddressHash, so raw addresses are never transmitted.
  • Client-side encryption: The Drop Client encrypts payloads locally with ML-KEM-1024 + AES-256-GCM before upload.
  • Per-address keys: Each Receive Address has its own keypair, limiting blast radius between conversations.
  • Policy enforcement: Usage limits, throttling, and attachment permissions are enforced per address.
  • Sender-facing context: A public sender message can be displayed in the Drop Client before submission.
  • Client-side decryption: Only the recipient's Safe can decrypt the payload.

Security Implications

  • Sender anonymity: No account or login is required for senders. For additional network privacy, access the Drop Client via Tor.
  • Metadata hardening: Servers only see hashed addresses and encrypted payloads, not raw Receive Addresses.
  • Compartmentalization: Per-address keys prevent one compromised address from exposing other conversations.

Use Cases

  • Whistleblower communications: Anonymous intake without creating accounts or linking identities.
  • Legal and journalism workflows: Share a rate-limited Receive Address for sensitive sources.
  • High-risk one-off drops: Rotate addresses after use to reduce exposure.

FAQs

Can UnoLock see message contents or raw addresses?

No. Payloads are encrypted client-side, and Receive Addresses are hashed before they are sent to the server.

Can anyone decrypt a VaultX payload?

Only the recipient's Safe with the matching private key can decrypt the payload.

How does VaultX protect against quantum attacks?

VaultX uses ML-KEM-1024 for key encapsulation and AES-256-GCM for payload encryption.

Compliance & Privacy Regulations

  • GDPR Alignment: VaultX avoids storing raw addresses and keeps message content encrypted client-side.

Integration with Other Features

  • Post-Quantum Encryption: ML-KEM-1024 + AES-256-GCM protect VaultX payloads against future cryptographic threats.
  • Threat Detection: Runtime monitoring helps detect tampering in sensitive messaging flows.

Back to Security Overview