Vaultaire vs Secret Photo Vault
Secret Photo Vault uses a passcode to lock a photo gallery. Vaultaire uses a pattern to generate an encryption key that protects files at the hardware level.
Feature Comparison
| Feature | Vaultaire | Secret Photo Vault |
|---|---|---|
| AES-256-GCM encryption Per-file authenticated encryption | ✓ | ✕ |
| Secure Enclave hardware keys Keys generated and stored in hardware | ✓ | ✕ |
| Pattern lock (not PIN) Visual pattern derives the encryption key | ✓ | ✕ |
| Multiple independent vaults Separate encrypted containers | ✓ | ✕ |
| Duress vault (destroy on trigger) Plausible deniability under coercion | ✓ | ✕ |
| Zero-knowledge architecture Developer cannot access your data | ✓ | ✕ |
| Encrypted iCloud backup Backup remains encrypted at rest | ✓ | ✕ |
| Encrypted vault sharing Share vaults without exposing plaintext | ✓ | ✕ |
| Recovery phrase BIP-39 mnemonic for vault recovery | ✓ | ✕ |
| No biometrics (by design) Cannot be compelled via FaceID/TouchID | ✓ | ✕ |
| Photos, Videos & Files support Store any file type, not just photos | ✓ | ✓ |
| Media optimization (HEIC/HEVC) Efficient storage of Apple media formats | ✓ | ✕ |
| Free tier available Usable without any payment | ✓ | ✓ |
| No ads in free tier Free version without advertisements | ✓ | ✕ |
| Share sheet import Import files from any app via iOS share sheet | ✓ | ✓ |
| Camera capture Capture directly into encrypted storage | ✓ | ✓ |
| Offline-only by default No network required, no data leaves device | ✓ | ✕ |
Vaultaire: 17/17 features. Secret Photo Vault: 5/17 features.
Pricing Comparison
Vaultaire
- 1 vault, 100 files
- Pattern lock, AES-256 encryption
- Camera/photo import
- No ads
- Unlimited vaults & files
- Duress vault
- iCloud backup & vault sharing
- All Pro features, 58% savings
- All Pro features forever
Secret Photo Vault
- Basic features with ads
- Passcode-based access
- Ad removal
- Additional features
- Same as monthly, annual discount
Passcode vs. Encryption Key
Secret Photo Vault asks you to set a passcode. That passcode gates access to the app's interface. It does not encrypt anything. The passcode is an access control mechanism, not a cryptographic primitive. The files behind it remain in their original format, stored in the app's sandbox directory. The distinction matters: an access control can be bypassed by accessing the data through a different path. An encryption key cannot be bypassed because without it, the data does not exist in readable form.
Vaultaire's pattern lock is not an access gate -- it is the seed for a key derivation function. Your visual pattern is processed through HKDF-SHA256 to produce a 256-bit encryption key. That key is used with AES-256-GCM to encrypt each file individually. Without the correct pattern, the correct key cannot be derived, and the data remains ciphertext.
File System Visibility
When a vault app stores files without encryption, those files are visible to any tool that can read the iOS file system. Connect the device to a Mac, open iTunes or Finder, and browse the app's document directory. The photos are right there -- JPEG, PNG, MOV files with their original content intact. A forensic examiner does not need to crack any passcode; they simply read the files from the backup or the device directly.
Vaultaire writes only ciphertext to disk. Each file is a blob of encrypted data with a unique initialization vector and authentication tag. Browsing the file system reveals nothing recognizable -- no image headers, no video codecs, no readable metadata. The files are opaque without the decryption key.
Data Loss Prevention
Secret Photo Vault provides no backup mechanism for hidden photos. Device loss, iOS update failures, or factory resets result in permanent data loss. This is a structural problem: without encryption, there is no safe way to back up the data to a cloud service, because the backup would expose the unencrypted photos to the cloud provider. The app is stuck in a paradox -- it cannot protect the data on disk, and it cannot safely back it up off-device.
Vaultaire solves this by encrypting before backup. iCloud backup transmits only encrypted blobs. Apple sees ciphertext, not photos. Your recovery phrase provides an independent restoration path. Data loss from device failure is a solved problem when the backup is encrypted end-to-end.
Password Recovery Limitations
Forget your Secret Photo Vault passcode, and you face a binary outcome: either the app has a recovery mechanism (which means the developer can access your data, defeating the purpose), or it does not (which means your data is permanently lost). Most passcode-based apps choose the latter, leaving users with no recourse. This is not a design choice born from strong security -- it is a consequence of not having a proper key management system.
Vaultaire provides a BIP-39 recovery phrase at vault creation. This is a standard from the cryptocurrency world, battle-tested across billions of dollars in value. The recovery phrase can reconstruct your encryption key without the developer ever having access to it. Zero-knowledge recovery: you can get your data back, but nobody else can.
What Secret Photo Vault Users Say
"Just a password on a folder."
Vaultaire's approach: Vaultaire does not password-protect folders. It encrypts each file individually with AES-256-GCM. The pattern is not a password -- it is the seed for a hardware-backed encryption key.
"Files visible through iTunes."
Vaultaire's approach: Files on disk are AES-256-GCM ciphertext. Connecting to iTunes or any file browser reveals encrypted blobs. No image headers, no readable content, no metadata leaks.
"Ads constantly."
Vaultaire's approach: Zero ads across all tiers. No ad SDK in the binary. No network calls to advertising infrastructure. Privacy and advertising are fundamentally incompatible.
"No backup, lost everything."
Vaultaire's approach: Encrypted iCloud backup preserves your vault through device changes and resets. The data is encrypted before it leaves the device. BIP-39 recovery phrase provides an additional safety net.
"Forgot password, no recovery."
Vaultaire's approach: BIP-39 recovery phrase generated at vault creation. Twelve words that can restore your entire vault on any device. Write them down once; recover any time.
Encryption Keys, Not Passcodes
A passcode locks a door. An encryption key makes the contents unreadable. Vaultaire uses AES-256-GCM with hardware-backed keys so your files are protected by cryptography, not access control.
Download Vaultaire