Vaultaire vs Safe Lock
Safe Lock offers PIN protection with optional cloud backup. Vaultaire encrypts files locally with hardware-backed keys and backs up only encrypted data.
機能比較
| 機能 | Vaultaire | Safe Lock |
|---|---|---|
| AES-256-GCM暗号化 ファイルごとの認証付き暗号化 | ✓ | ✕ |
| Secure Enclaveハードウェア鍵 鍵はハードウェアで生成・保存 | ✓ | ✕ |
| パターンロック(PINではない) 視覚的パターンで暗号鍵を導出 | ✓ | ✕ |
| 複数の独立ボールト 別々の暗号化コンテナ | ✓ | Partial (albums) |
| 緊急ボールト(トリガーで破壊) 強制下でのもっともらしい否認可能性 | ✓ | ✕ |
| Zero-Knowledgeアーキテクチャ 開発者もデータにアクセスできない | ✓ | ✕ |
| 暗号化済みiCloudバックアップ バックアップは保存時も暗号化を維持 | ✓ | ✕ |
| 暗号化ボールト共有 平文を公開せずにボールトを共有 | ✓ | ✕ |
| リカバリーフレーズ ボールト復旧用BIP-39ニーモニック | ✓ | ✕ |
| 生体認証なし(設計上の判断) FaceID/TouchIDで強制できない | ✓ | ✕ |
| 写真・動画・ファイル対応 写真だけでなく任意のファイルを保存 | ✓ | ✓ |
| メディア最適化(HEIC/HEVC) Appleメディア形式の効率的な保存 | ✓ | ✕ |
| 無料プランあり 支払いなしで利用可能 | ✓ | ✓ |
| 無料プランに広告なし 広告なしの無料版 | ✓ | ✕ |
| 共有シートインポート iOS共有シート経由で任意のアプリからファイルをインポート | ✓ | ✓ |
| カメラ撮影 暗号化ストレージに直接撮影 | ✓ | ✓ |
| デフォルトでオフライン専用 ネットワーク不要、データはデバイスから出ない | ✓ | ✕ |
Vaultaire:17/17項目。Safe Lock:5/17項目(1つは部分対応)。
料金比較
Vaultaire
- 1ボールト、100ファイル
- パターンロック、AES-256暗号化
- カメラ/写真インポート
- 広告なし
- 無制限のボールト&ファイル
- 緊急ボールト
- iCloudバックアップ&ボールト共有
- 全Pro機能、58%割引
- 全Pro機能を永久に
Safe Lock
- 広告付き基本機能
- PINベースアクセス
- 広告削除
- Cloud backup (unencrypted)
- 月額と同内容、年額割引
- 一回限りの購入
Cloud Backup Without Encryption
Safe Lock offers cloud backup as a premium feature. This sounds like a data safety improvement -- until you examine what is actually being backed up. The photos are uploaded to cloud storage without end-to-end encryption. The cloud provider can read them. An attacker who compromises the cloud account can view them. A subpoena to the cloud provider can obtain them. The backup feature creates a second copy of your private photos in a location with weaker access controls than your device.
Vaultaire encrypts files before they leave the device. iCloud backup transmits only AES-256-GCM ciphertext. Apple's servers store encrypted blobs. A compromised iCloud account reveals nothing readable. A subpoena returns ciphertext. The backup improves data durability without degrading data confidentiality. This is the correct way to implement cloud backup for sensitive data.
PIN vs. Pattern as Authentication
Safe Lock uses a numeric PIN for access control. A 4-digit PIN has 10,000 possible combinations. A 6-digit PIN has 1,000,000. These are small keyspaces, vulnerable to brute-force attacks. More importantly, the PIN only gates access to the app's UI -- it does not derive an encryption key. The PIN is a lock on a door; break the door frame (access the file system), and the lock is irrelevant.
Vaultaire's visual pattern serves a dual purpose: it authenticates the user and it derives the encryption key via HKDF-SHA256. The pattern's keyspace is substantially larger than a numeric PIN, and critically, the pattern is not just an access gate. Without the correct pattern, the correct encryption key cannot be computed, and the data remains ciphertext. The authentication mechanism and the cryptographic protection are the same thing.
Data Portability
Safe Lock users report losing photos during device transfers, iOS updates, and app reinstallation. Without encrypted backup, the hidden photos exist only in the app's local sandbox. When that sandbox is deleted -- through uninstallation, a failed update, or a device wipe -- the photos are gone permanently. There is no recovery mechanism, no export path that preserves privacy, and no way to migrate data safely between devices.
Vaultaire provides multiple data portability paths. Encrypted iCloud backup handles automatic device migration. The BIP-39 recovery phrase enables manual vault restoration on any device. Encrypted vault sharing allows you to transfer vaults between users or devices with end-to-end encryption. The data is portable because it is encrypted -- you can move ciphertext anywhere without compromising confidentiality.
緊急保護機能の不在
Safe Lock provides no duress vault, no plausible deniability mechanism, and no way to protect your data under coercion. If someone forces you to unlock the app, every hidden photo is immediately visible. There is no secondary vault that can be sacrificed, no trigger that wipes sensitive data, and no way to demonstrate that you have nothing to hide when you do.
Vaultaire's duress vault is designed for exactly this scenario. A separate pattern opens a decoy vault while silently destroying the real vault's key material. The attacker sees a vault with innocuous content. The sensitive vault becomes permanently inaccessible. There is no forensic trace that another vault existed, because the key material is gone. This is plausible deniability implemented at the cryptographic level.
What Safe Lock Users Say
"Cloud backup is not encrypted."
Vaultaireのアプローチ: All iCloud backup data is encrypted with AES-256-GCM before leaving the device. Apple's servers store ciphertext. A compromised iCloud account reveals nothing readable.
"Ads everywhere."
Vaultaireのアプローチ: Zero ads in every tier. No advertising SDKs in the binary. No network connections to ad infrastructure. Privacy and ad-supported business models are incompatible.
"Photos vanished after transfer."
Vaultaireのアプローチ: Encrypted iCloud backup ensures vault contents persist across device transfers. BIP-39 recovery phrase provides an independent restoration path that does not depend on any transfer process succeeding.
"No duress or plausible deniability."
Vaultaireのアプローチ: Duress vault opens a decoy while cryptographically destroying the real vault's key material. No forensic evidence of the destroyed vault remains. Plausible deniability at the hardware level.
"PIN-only is not real security."
Vaultaireのアプローチ: Visual pattern derives the encryption key through HKDF-SHA256. The pattern is not just access control -- it is the cryptographic seed. Without it, decryption is computationally infeasible.
Encrypted Backup, Not Exposed Backup
Cloud backup should protect your data, not duplicate your exposure. Vaultaire encrypts before uploading so your backup is as secure as your device.
Vaultaireをダウンロード