iPhone with locked photos behind frosted glass overlay and padlock icon

How to Lock Photos on iPhone in 2026 (Step-by-Step)

Face ID can gate the Hidden Album. Encryption is what actually locks the files.

You can lock photos on iPhone using Face ID through the built-in Hidden Album in iOS 18, but this only controls access to an album. It does not encrypt the files. For actual file-level locking, where the photo data becomes unreadable without a key, you need an app that applies AES-256 encryption to each file individually. This guide covers both methods, tests their real bypass resistance, and explains the difference between locking and hiding. For the hide-specific walkthrough, see How to Hide Photos on iPhone.

Locking vs Hiding: The Distinction That Matters

Locking and hiding are two different operations that protect against different threats. Hiding removes a photo from your visible library so someone scrolling your camera roll does not see it. Locking restricts access so someone who finds the photo cannot open it. Most iPhone users conflate the two, and most guides do too.

The iOS Hidden Album does both partially. It moves photos out of the main library and requires Face ID or Touch ID to view the album. But the lock is a UI gate, not file encryption. The photo data remains unencrypted on disk. A forensic tool, an iTunes backup extractor, or a jailbroken device can access hidden photos without ever triggering the Face ID prompt.

True locking means the file itself is transformed into unreadable ciphertext. Without the correct key, the data is noise. That requires encryption, not access control.

Hiding Locking (access control) Locking (encryption)
What it doesRemoves photo from visible libraryRequires authentication to viewTransforms file data into ciphertext
iOS exampleHidden AlbumFace ID on Hidden AlbumNot available natively
Third-party exampleAny vault appPIN-gated vault appVaultaire (AES-256-GCM)
Survives forensic extractionNoNoYes
Survives jailbreakNoNoYes
Survives iCloud compromiseNoNoYes (if using encrypted backup)

If your threat model is a friend borrowing your phone, the Hidden Album is sufficient. If your concern involves device theft, legal compulsion, cloud breaches, or anyone with technical access, you need encryption.

How to Lock Photos Using the Hidden Album (iOS 18)

The Hidden Album is the fastest built-in method. It requires iOS 16 or later for the Face ID lock.

Step 1: Select the Photos to Lock

Open the Photos app. Tap Select in the top right. Tap each photo or video you want to lock. You can also tap and drag across multiple items to select them quickly.

Step 2: Move Photos to the Hidden Album

Tap the share icon in the bottom left. Scroll down and tap Hide. Confirm by tapping Hide [N] Photos. The selected items disappear from your main library, Recents, and other albums.

Step 3: Verify the Lock Is Active

Go to the Albums tab. Scroll to the bottom under Utilities. Tap Hidden. iOS prompts for Face ID, Touch ID, or your device passcode. If that prompt does not appear, go to Settings > Photos and confirm Use Face ID is toggled on.

Step 4: Confirm Screen Time Is Not a Backdoor

Open Settings > Screen Time > Content & Privacy Restrictions > Photos. If this is set to Don't Allow Changes, users cannot unhide photos. But anyone who knows your Screen Time passcode can change that setting. If the Screen Time passcode matches the device passcode, it adds no extra protection.

Why the Hidden Album Is Not a Real Lock

The Hidden Album satisfies casual privacy. It fails under scrutiny. Here is what testing reveals about its actual protection level.

Test 1: iTunes/Finder backup extraction. Connect the iPhone to a Mac. Create an unencrypted local backup using Finder. Use a free tool like iMazing or iExplorer to browse the backup contents. Hidden Album photos appear in the backup, fully readable, with original filenames and metadata.

Test 2: iCloud access. If iCloud Photos is enabled, hidden photos sync to iCloud. Anyone who logs into iCloud.com with your Apple Account credentials can view them. Apple holds the encryption keys for standard iCloud Photos unless you enable Advanced Data Protection.

Test 3: Screen Time bypass. A second person with your device passcode can navigate to Settings > Screen Time, disable Content & Privacy Restrictions, and access the Hidden Album. On family-shared devices where a parent has the Screen Time passcode, this is trivial.

Test 4: Siri and search. As of iOS 18, hidden photos no longer appear in Spotlight search results. This was a known bypass in earlier iOS versions. Verify this by searching for a hidden photo filename in Spotlight.

Threat Hidden Album Protected? Notes
Casual browsingYesPhoto is not in the main library
Someone with your device passcodePartialFace ID prompts, but passcode fallback still works
Backup extraction (unencrypted)NoPhotos remain fully readable in backup output
iCloud access (standard)NoApple holds the decryption keys
iCloud access (ADP enabled)YesEnd-to-end encrypted, but opt-in and off by default
Forensic toolsNoFile data remains unencrypted on disk
Jailbroken deviceNoFull file-system access defeats the UI lock

How to Lock Photos with Encryption (Vaultaire)

Vaultaire applies AES-256-GCM encryption to every file at the moment of import. The encryption key is derived from a pattern you draw on a 5x5 grid using PBKDF2 with HMAC-SHA512. The pattern is never stored on the device. Each vault has a unique cryptographic salt and each file has a unique initialization vector.

Step 1: Download and Open Vaultaire

Install Vaultaire from the App Store. Open the app. There is no account creation, no email, and no setup wizard. You see a 5x5 grid of dots.

Step 2: Draw a Pattern to Create a Vault

Draw a pattern connecting at least 4 dots on the grid. This pattern becomes the raw input for your encryption key. A 5x5 grid offers billions of possible patterns, while staying easy to repeat through muscle memory.

Step 3: Import Photos

Tap the import button inside the vault. Select photos from your camera roll or use the built-in camera to capture directly into the vault. Photos captured with the in-app camera never touch the photo library in unencrypted form.

Step 4: Delete Originals from the Camera Roll

After confirming the photos appear in the vault, delete the originals from the Photos app. Empty Recently Deleted. Until the originals are deleted, unencrypted copies still exist on the device.

Step 5: Verify the Lock

Close Vaultaire. The encryption key is wiped from memory the moment the app closes. Reopen the app and draw your pattern again to verify access. Draw a different pattern and you will see a different vault or an empty one, because a different pattern produces a different key.

Pattern Encryption vs PIN-on-Launch: Why the Difference Is Fundamental

Most photo vault apps on the App Store use a PIN or password as a gate. You enter the code, the app opens, and you see your photos. The code is an access-control mechanism. Behind the gate, the photos typically sit in a renamed folder with no encryption applied. A forensic examiner with file-system access can read them without knowing the PIN.

Pattern encryption in Vaultaire works differently. The pattern is not a gate. It is the raw material for the encryption key. PBKDF2 takes the pattern input plus a unique per-vault salt and runs it through hundreds of thousands of iterations of HMAC-SHA512 to derive a 256-bit AES key. That key encrypts every file in the vault with AES-256-GCM.

PIN-on-launch (typical vault app) Pattern encryption (Vaultaire)
What the code doesUnlocks the app UIDerives the encryption key via PBKDF2
File state on diskUnencrypted and readable by forensic toolsAES-256-GCM ciphertext that looks like random noise without the key
Wrong code behaviorShows an "Incorrect PIN" errorOpens a different vault, so there is no error to show
Brute-force resistanceLowHigh, because each guess requires full PBKDF2 derivation
Forensic bypassTrivial if the files are readable on diskComputationally infeasible without the correct key
Pattern/PIN stored on deviceUsually yesNo

This is not a marginal improvement. It is the difference between a lock on a door and a wall where the door used to be.

Other Methods to Lock Photos on iPhone

Notes App Lock

You can embed photos in a locked note. Open Notes, create a new note, add photos via the camera icon, then tap the share icon and select Lock Note. The note is encrypted with your device passcode or a separate password. This provides real encryption, but Notes is not a good photo-management tool.

Shortcuts Automation

Some guides suggest using the Shortcuts app to create an automation that moves photos to a locked folder. This is fragile. Shortcuts automations can be viewed and edited by anyone with device access, and the "locked folder" still has the same limitations as the Hidden Album.

Third-Party Vault Apps Without Encryption

Apps like Keepsafe, Private Photo Vault, and Calculator# provide PIN-gated access to a hidden photo gallery. Across the comparisons in our vault app comparison hub, the repeated pattern is the same: the PIN prevents casual access through the app interface, but readable files on disk make backup extraction or forensic bypass straightforward.

Tips and Common Mistakes

  • Do not rely on Screen Time as a lock. Screen Time restrictions can be reset by anyone with the device passcode.
  • Delete originals after importing to a vault. The most common mistake is importing photos into a secure app but leaving the unencrypted originals in the camera roll.
  • Empty the Recently Deleted album. Deleted photos persist for 30 days, which leaves a long recovery window.
  • Enable encrypted iPhone backups. In Finder on Mac or iTunes on Windows, select Encrypt local backup.
  • Check your iCloud configuration. If iCloud Photos is enabled, consider Advanced Data Protection or turning iCloud Photos off for sensitive content.
  • Use the in-app camera when available. Vaultaire can capture directly into the encrypted vault so the photo never lands in the camera roll first.

Frequently Asked Questions

Can someone unlock my Hidden Album without Face ID?

Yes. Face ID is the primary authentication, but the device passcode is always a fallback. Anyone with your passcode can access the Hidden Album. On devices without Face ID or Touch ID, the passcode is the only barrier.

Does hiding a photo on iPhone encrypt it?

No. The Hidden Album moves photos to a separate album and requires authentication to view it, but the photo files remain unencrypted on disk. They are still readable through backup extraction tools, iCloud access without Advanced Data Protection, and forensic software.

What is the most secure way to lock photos on iPhone?

The most secure method is AES-256 encryption applied to each file individually, with keys derived from a user-provided credential that is never stored on the device. That is the model used by Vaultaire.

Can police access hidden photos on iPhone?

Law enforcement with a valid court order can compel Apple to provide iCloud data unless Advanced Data Protection is enabled. With physical device access, forensic tools can extract hidden photos because the files are not encrypted.

Is the Notes app lock secure for photos?

The Notes lock uses strong encryption, but Notes is not designed for browsing, organizing, and importing large photo libraries. It works for a few sensitive items. It does not scale well.

How many photos can Vaultaire lock?

The free tier supports up to 5 vaults with 100 files each. Vaultaire Pro removes those limits, but every tier uses the same AES-256-GCM encryption and zero-knowledge architecture.

Bottom Line

The iPhone Hidden Album is a visibility toggle with a Face ID gate. It prevents casual discovery. It does not prevent extraction, forensic analysis, or cloud-based access. If your threat model goes beyond someone swiping through your camera roll, you need file-level encryption.

Vaultaire encrypts every photo with AES-256-GCM the moment you import it. The encryption key is derived from a pattern you draw, never stored on the device, and wiped from memory when the app closes. The files are mathematically unreadable without the correct pattern.

Related reading: How to Hide Photos on iPhone | Pattern Encryption | Security Architecture