Hidden Vaults: Nobody Knows How Many Exist
There is no vault list. No directory. No count. Vaultaire makes it cryptographically impossible to determine how many vaults exist on your device — even with forensic tools and physical access. If nobody can prove a vault exists, nobody can demand you open it.
What Does "Hidden Vaults" Actually Mean?
Most vault apps work like filing cabinets. Open the app, and you see a list of your vaults. Maybe they have names. Maybe they show a count. Maybe there is a little lock icon next to each one. The app knows exactly how many vaults you have, and that information is visible to anyone who opens the app — or examines the device.
Vaultaire works differently. There is no list of vaults. No directory. No registry. No metadata file that catalogs what exists. When you draw a pattern, Vaultaire does not look up your vault in a database. It derives a cryptographic key from your pattern and attempts to decrypt data with that key. If the key matches an existing vault, the data decrypts into your files. If it does not match anything, the decryption produces noise — and Vaultaire cannot distinguish between "no vault exists for this pattern" and "a vault exists but you drew the wrong pattern."
This is not a UI decision. It is an architectural one. Vaultaire genuinely does not know how many vaults are on your device. The app cannot count them, cannot enumerate them, and cannot reveal them — because it was never designed to track them in the first place.
Most apps hide vaults from the user interface. Vaultaire hides vaults from itself. The app has no mechanism to enumerate vaults because no enumerable record exists. A vault is nothing more than encrypted data that becomes meaningful only when the correct key is applied.
This Is Not a "Hidden Folder"
The phrase "hidden vault" might make you think of apps that tuck a folder away where you cannot easily see it. Maybe the folder is named with a dot prefix so it does not show up in a file browser. Maybe the app uses a "calculator" disguise to conceal its real purpose. These are camouflage tricks, and they all share the same fatal flaw: the hidden data is still there, in a known location, waiting to be found.
A forensic examiner with access to your device can trivially find a hidden folder. File system tools list every directory. Storage analyzers show where disk space is allocated. Even a moderately tech-savvy friend with five minutes and a search engine could locate most "hidden" folders.
Vaultaire does not hide folders. It does not disguise files. Instead, the encrypted data for all vaults exists in a single, undifferentiated storage pool. There are no file boundaries that correspond to vault boundaries. There are no headers marking where one vault ends and another begins. The entire pool is encrypted data, and without the correct key for a specific vault, there is no way to determine which bytes belong to which vault — or how many vaults the pool contains.
The difference is the difference between hiding a book on a high shelf and dissolving the book's ink into a swimming pool. One requires a ladder. The other requires knowing exactly which molecules were yours.
Storage Obfuscation: The Padding Mechanism
Even without a vault list, a clever adversary might try a different approach: analyzing disk usage. If Vaultaire uses 500 MB of storage today and 800 MB tomorrow, maybe you added a vault. If deleting photos from one vault reduces storage by exactly 200 MB, maybe there is a correlation to exploit.
Vaultaire defeats this with storage padding. The app maintains a consistent storage footprint by padding its data pool with cryptographically random bytes. When you add files to a vault, the padding shrinks. When you delete files, the padding grows. The total size of the storage pool changes only at predetermined thresholds, not in response to individual file operations.
This means an observer watching your device's storage over time cannot determine whether changes are caused by adding files, deleting files, creating new vaults, or destroying old ones. The storage footprint is designed to be uninformative. It is noise by design.
How Padding Works
The padding mechanism operates on a simple principle: the storage pool always occupies a size that falls on a fixed step boundary. Think of it like a staircase rather than a ramp. Your actual data might be 347 MB, but the pool occupies 512 MB. You add 100 MB of photos, and the pool still occupies 512 MB — the padding absorbed the difference. Only when you cross the next step threshold does the pool size change, and that change is identical regardless of whether you added one vault or ten.
The padding bytes are indistinguishable from encrypted data. Both are random-looking byte sequences. There is no header, no marker, and no metadata that identifies which bytes are padding and which are encrypted vault contents. Without the correct key, every byte looks exactly the same.
Forensic Resistance: What Happens When They Take Your Phone
Let us be specific about the threat model. Imagine someone with physical access to your device, professional forensic tools, unlimited time, and the legal authority to examine every byte. What can they determine about your vaults?
What Forensic Tools Can See
A forensic examiner can see that Vaultaire is installed. They can see that Vaultaire is using a certain amount of storage. They can see that the stored data is encrypted. That is all.
What Forensic Tools Cannot Determine
- How many vaults exist. There is no vault count, no directory structure, and no metadata that reveals the number of vaults.
- Whether any vaults exist. The storage pool exists regardless of whether it contains zero vaults or a hundred. Padding fills the space either way.
- What is in any vault. The encrypted data is indistinguishable from random noise without the correct key.
- When vaults were created or modified. Timestamps are encrypted along with the data. File system timestamps reflect pool-level operations, not vault-level ones.
- How much real data exists. Padding makes the actual data volume indeterminate. 500 MB of storage could contain 10 MB of real data and 490 MB of padding, or 490 MB of real data and 10 MB of padding.
In traditional forensic analysis, encrypted data is a challenge — but the existence of encrypted data is evidence. With Vaultaire, even the existence of vaults is unprovable. An examiner can say "Vaultaire is installed" but cannot say "this device contains N vaults." The answer is always: we do not know, and neither does the app.
How Hidden Vaults Enable Plausible Deniability
Hidden vaults are the foundation that makes Vaultaire's plausible deniability feature actually work. Here is why the two are inseparable.
Plausible deniability means that every pattern you draw opens something. Draw your real pattern, and you see your private files. Draw a different pattern, and you see a decoy vault — a set of innocuous photos that you placed there for exactly this scenario. To an observer, both outcomes look identical. There is no way to tell whether someone drew their "real" pattern or their "decoy" pattern.
But plausible deniability only works if the existence of additional vaults is undetectable. If an examiner can determine that your device contains three vaults, then showing them one vault is not deniable — they know two more exist. Hidden vaults eliminate this vulnerability. Because nobody can count your vaults, nobody can prove you are withholding access to any of them.
The Complete Chain
- Step 1: You create multiple vaults with different patterns — one for real files, one for decoys, as many as you want.
- Step 2: If pressured, you draw the decoy pattern. The observer sees a vault with boring photos.
- Step 3: The observer cannot determine whether other vaults exist. There is no count, no list, no evidence of additional vaults.
- Step 4: You truthfully state that you have shown them what you have. They cannot prove otherwise.
Without hidden vaults, plausible deniability is theater. With hidden vaults, it is mathematics.
Why This Matters
You might think forensic resistance sounds extreme. Most people are not facing device seizures or court orders. But the principle behind hidden vaults protects you in everyday scenarios too.
A partner who picks up your phone cannot tell whether you have private vaults. A coworker borrowing your device sees nothing to be curious about. A thief who steals your phone cannot determine whether there is anything worth extracting. In every case, the protection is the same: what cannot be found cannot be targeted.
This is a fundamental shift in how privacy works. Traditional security asks: "Can they break in?" Hidden vaults ask a different question entirely: "Can they even tell there is something to break into?" The answer, by design, is no.
Frequently Asked Questions
If the app does not know how many vaults exist, how does it find mine?
When you draw a pattern, Vaultaire derives a cryptographic key and uses it to attempt decryption against the storage pool. If the key matches a vault, the data decrypts into meaningful files. If it does not match, the result is noise. The app does not search for your vault — it mathematically reconstructs it from your pattern. No lookup is needed because there is no index to look up.
Can someone tell how many vaults I have by looking at storage usage?
No. Vaultaire pads its storage pool with cryptographically random data so the total footprint does not correlate with the number or size of vaults. Whether you have one vault with 50 photos or ten vaults with 500 photos, the storage pool can occupy the same amount of space. The padding absorbs the difference.
What happens if I delete a vault? Does the storage shrink?
When you delete a vault, the space it occupied is reclaimed by padding. The total storage footprint does not immediately change. It only adjusts when the padding-to-data ratio crosses a predetermined threshold, and that adjustment is identical regardless of what caused it. An observer cannot determine whether storage changed because you deleted a vault, added files, or simply triggered a routine rebalance.
How is this different from just encrypting a folder?
An encrypted folder is still a folder. It appears in the file system, it has a name, it has a size, and it has timestamps. An examiner knows it exists even if they cannot read its contents. Vaultaire's hidden vaults have no file system presence as individual entities. They exist only as undifferentiated bytes within a padded storage pool. There is nothing to point at and say "that is a vault."
Could a future update to Vaultaire compromise hidden vaults?
The hidden vault architecture is fundamental to how Vaultaire stores data, not a feature that can be toggled off. There is no vault registry to add, no directory structure to create. Changing this would require rebuilding the entire storage engine from scratch. The design is intentionally irreversible — the app cannot betray what it was never built to know.
Does hidden vaults work with iCloud backup?
Yes. When Vaultaire backs up to iCloud, the entire padded storage pool is encrypted and uploaded as a single blob. The backup contains the same undifferentiated data as the local storage. iCloud sees an encrypted file of a certain size — it cannot determine how many vaults are inside, what they contain, or whether the data is mostly padding or mostly real files.
Your Vaults, Your Secret
Create as many vaults as you want. Nobody will ever know how many exist — not even the app.
Download Vaultaire Free