Complete end-to-end control and privacy over your secrets, with no third-party data collection.
Create and manage secret vaults implemented as encrypted virtual filesystems with automatic version history tracking. Vaults are placed in decentralised keynodes for redundancy and privilege separation.
Discover keynodes via digital identity graphs ("gestalts") through social networks and enterprise identity providers. Then share secrets by pushing or pulling vaults across an end-to-end encrypted federated hierarchical network of keynodes.
Integrate into external programs requiring secret injection through form auto-fill, clipboard copy-paste, drag and drop, filesystem, environment variables, pipes, RESTful JSON API and gRPC.
Maintain sharing and integration policy across the entire keynode hierarchy, and monitor the audit log of every single secret interaction.