Vaultaire vs Hide it Pro
Hide it Pro focuses on obscuring files through app disguise. Vaultaire focuses on making files cryptographically unreadable. One is camouflage, the other is armor.
機能比較
| 機能 | Vaultaire | Hide it Pro |
|---|---|---|
| AES-256-GCM暗号化 ファイルごとの認証付き暗号化 | ✓ | ✕ |
| Secure Enclaveハードウェア鍵 鍵はハードウェアで生成・保存 | ✓ | ✕ |
| パターンロック(PINではない) 視覚的パターンで暗号鍵を導出 | ✓ | ✕ |
| 複数の独立ボールト 別々の暗号化コンテナ | ✓ | Partial (folders) |
| 緊急ボールト(トリガーで破壊) 強制下でのもっともらしい否認可能性 | ✓ | ✕ |
| Zero-Knowledgeアーキテクチャ 開発者もデータにアクセスできない | ✓ | ✕ |
| 暗号化済みiCloudバックアップ バックアップは保存時も暗号化を維持 | ✓ | ✕ |
| 暗号化ボールト共有 平文を公開せずにボールトを共有 | ✓ | ✕ |
| リカバリーフレーズ ボールト復旧用BIP-39ニーモニック | ✓ | ✕ |
| 生体認証なし(設計上の判断) FaceID/TouchIDで強制できない | ✓ | ✕ |
| 写真・動画・ファイル対応 写真だけでなく任意のファイルを保存 | ✓ | ✓ |
| メディア最適化(HEIC/HEVC) Appleメディア形式の効率的な保存 | ✓ | ✕ |
| 無料プランあり 支払いなしで利用可能 | ✓ | ✓ |
| 無料プランに広告なし 広告なしの無料版 | ✓ | ✕ |
| 共有シートインポート iOS共有シート経由で任意のアプリからファイルをインポート | ✓ | ✓ |
| カメラ撮影 暗号化ストレージに直接撮影 | ✓ | ✓ |
| デフォルトでオフライン専用 ネットワーク不要、データはデバイスから出ない | ✓ | ✕ |
Vaultaire:17/17項目。Hide it Pro:5/17項目(1つは部分対応)。
料金比較
Vaultaire
- 1ボールト、100ファイル
- パターンロック、AES-256暗号化
- カメラ/写真インポート
- 広告なし
- 無制限のボールト&ファイル
- 緊急ボールト
- iCloudバックアップ&ボールト共有
- 全Pro機能、58%割引
- 全Pro機能を永久に
Hide it Pro
- 広告付き基本の非表示機能
- App disguise interface
- 広告削除
- 追加機能
- 月額と同内容、年額割引
Obscurity vs. Security Principles
In information security, there is a well-established principle: security through obscurity is not security. Kerckhoffs's principle, formulated in 1883, states that a cryptographic system should be secure even if everything about the system is public knowledge, except the key. Hide it Pro violates this principle at its foundation. Its security model depends on the attacker not knowing what the app is. Once that knowledge is obtained -- and it is trivially obtainable -- the protection collapses entirely.
Vaultaire is built on Kerckhoffs's principle. The encryption algorithm (AES-256-GCM), the key derivation function (HKDF-SHA256), and the hardware security module (Secure Enclave) are all publicly known. The security depends solely on the secrecy of your pattern. You can publish the source code, explain the architecture in detail, and hand the device to a forensic lab. Without the pattern, the data remains encrypted.
Forensic Vulnerability
Hide it Pro stores files in its app sandbox without cryptographic transformation. A forensic extraction tool -- the kind used by law enforcement, corporate investigators, or even commercially available phone recovery software -- can read these files directly from a device backup. The app's disguise is irrelevant at the file system level. The files have standard image and video headers. They can be identified, catalogued, and viewed by any tool that understands common media formats.
Vaultaire files on disk have no recognizable headers. Each file is AES-256-GCM ciphertext with a random initialization vector. Forensic tools will find encrypted blobs that cannot be classified by file type, cannot be previewed, and cannot be decrypted without the key material held in the Secure Enclave. The forensic report will say "encrypted data, key not available."
The Ad Model Problem
Hide it Pro's free tier is ad-supported. This means the app integrates third-party advertising SDKs -- libraries of code written by companies like Google, Meta, or smaller ad networks. These SDKs collect device identifiers, usage patterns, and sometimes location data. They establish network connections to ad servers. They track user behavior across apps. All of this happens inside an application that is supposed to protect your privacy. The contradiction is structural, not incidental.
Vaultaire contains no advertising SDKs. The app makes no network connections by default. There are no device fingerprints transmitted, no usage analytics shared, and no behavioral data collected. The free tier is genuinely free -- funded by optional Pro upgrades, not by monetizing user data.
Multi-Purpose vs. Focused Tool
Hide it Pro attempts to hide photos, videos, notes, audio recordings, and more behind a single disguised interface. This breadth comes at the cost of depth. Each media type gets basic hiding functionality, but none gets the kind of rigorous cryptographic treatment that a dedicated vault requires. There are no independent vault containers, no per-vault key isolation, no duress mechanisms, and no encrypted sharing. The app hides many things poorly rather than protecting one thing well.
Vaultaire does one thing: encrypted file storage. Each vault is an independent cryptographic container with its own key material derived from its own pattern. Vaults can be shared, backed up, and destroyed individually. The duress vault provides plausible deniability. The architecture is designed for a single purpose, executed with the rigor that purpose demands.
What Hide it Pro Users Say
"Obscurity is not security."
Vaultaireのアプローチ: Vaultaire is built on Kerckhoffs's principle. The entire system is designed to be secure even when the attacker knows everything about the app. Only the pattern remains secret.
"Files discoverable through file system."
Vaultaireのアプローチ: Every file on disk is AES-256-GCM ciphertext. No recognizable headers, no metadata, no file type indicators. Forensic tools find encrypted blobs, nothing more.
"Overwhelming ads."
Vaultaireのアプローチ: No ads in any tier. No ad SDKs compiled into the binary. The business model is Pro subscriptions, not user attention.
"Complex UI hides nothing from forensics."
Vaultaireのアプローチ: Simple, purpose-built interface backed by real cryptography. Forensic resistance comes from AES-256-GCM and Secure Enclave key protection, not from UI complexity.
"No real encryption."
Vaultaireのアプローチ: AES-256-GCM with HKDF-SHA256 key derivation and Secure Enclave hardware key storage. Every file encrypted individually with unique nonces and authenticated tags.
Armor, Not Camouflage
Hiding an app icon does not protect your data. AES-256-GCM encryption with hardware-backed keys does. Choose the tool that survives scrutiny, not the one that avoids it.
Vaultaireをダウンロード