Secret Vault icon VS Vaultaireアイコン

Vaultaire vs Secret Photo Vault

Secret Photo Vault uses a passcode to lock a photo gallery. Vaultaire uses a pattern to generate an encryption key that protects files at the hardware level.

Secret Photo Vault: 27K ratings, 4.5 stars

機能比較

機能 Vaultaire Secret Photo Vault
AES-256-GCM暗号化 ファイルごとの認証付き暗号化
Secure Enclaveハードウェア鍵 鍵はハードウェアで生成・保存
パターンロック(PINではない) 視覚的パターンで暗号鍵を導出
複数の独立ボールト 別々の暗号化コンテナ
緊急ボールト(トリガーで破壊) 強制下でのもっともらしい否認可能性
Zero-Knowledgeアーキテクチャ 開発者もデータにアクセスできない
暗号化済みiCloudバックアップ バックアップは保存時も暗号化を維持
暗号化ボールト共有 平文を公開せずにボールトを共有
リカバリーフレーズ ボールト復旧用BIP-39ニーモニック
生体認証なし(設計上の判断) FaceID/TouchIDで強制できない
写真・動画・ファイル対応 写真だけでなく任意のファイルを保存
メディア最適化(HEIC/HEVC) Appleメディア形式の効率的な保存
無料プランあり 支払いなしで利用可能
無料プランに広告なし 広告なしの無料版
共有シートインポート iOS共有シート経由で任意のアプリからファイルをインポート
カメラ撮影 暗号化ストレージに直接撮影
デフォルトでオフライン専用 ネットワーク不要、データはデバイスから出ない

Vaultaire:17/17項目。Secret Photo Vault:5/17項目。

料金比較

Vaultaire

無料プラン
$0
  • 1ボールト、100ファイル
  • パターンロック、AES-256暗号化
  • カメラ/写真インポート
  • 広告なし
Proプラン(月額)
$2.99/mo
  • 無制限のボールト&ファイル
  • 緊急ボールト
  • iCloudバックアップ&ボールト共有
Proプラン(年額)
$14.99/yr
  • 全Pro機能、58%割引
Proプラン(買い切り)
$39.99
  • 全Pro機能を永久に

Secret Photo Vault

無料プラン
$0
  • 広告付き基本機能
  • Passcode-based access
プレミアム(月額)
~$2.99/mo
  • 広告削除
  • 追加機能
プレミアム(年額)
~$9.99/yr
  • 月額と同内容、年額割引

Passcode vs. Encryption Key

Secret Photo Vault asks you to set a passcode. That passcode gates access to the app's interface. It does not encrypt anything. The passcode is an access control mechanism, not a cryptographic primitive. The files behind it remain in their original format, stored in the app's sandbox directory. The distinction matters: an access control can be bypassed by accessing the data through a different path. An encryption key cannot be bypassed because without it, the data does not exist in readable form.

Vaultaire's pattern lock is not an access gate -- it is the seed for a key derivation function. Your visual pattern is processed through HKDF-SHA256 to produce a 256-bit encryption key. That key is used with AES-256-GCM to encrypt each file individually. Without the correct pattern, the correct key cannot be derived, and the data remains ciphertext.

File System Visibility

When a vault app stores files without encryption, those files are visible to any tool that can read the iOS file system. Connect the device to a Mac, open iTunes or Finder, and browse the app's document directory. The photos are right there -- JPEG, PNG, MOV files with their original content intact. A forensic examiner does not need to crack any passcode; they simply read the files from the backup or the device directly.

Vaultaire writes only ciphertext to disk. Each file is a blob of encrypted data with a unique initialization vector and authentication tag. Browsing the file system reveals nothing recognizable -- no image headers, no video codecs, no readable metadata. The files are opaque without the decryption key.

Data Loss Prevention

Secret Photo Vault provides no backup mechanism for hidden photos. Device loss, iOS update failures, or factory resets result in permanent data loss. This is a structural problem: without encryption, there is no safe way to back up the data to a cloud service, because the backup would expose the unencrypted photos to the cloud provider. The app is stuck in a paradox -- it cannot protect the data on disk, and it cannot safely back it up off-device.

Vaultaire solves this by encrypting before backup. iCloud backup transmits only encrypted blobs. Apple sees ciphertext, not photos. Your recovery phrase provides an independent restoration path. Data loss from device failure is a solved problem when the backup is encrypted end-to-end.

Password Recovery Limitations

Forget your Secret Photo Vault passcode, and you face a binary outcome: either the app has a recovery mechanism (which means the developer can access your data, defeating the purpose), or it does not (which means your data is permanently lost). Most passcode-based apps choose the latter, leaving users with no recourse. This is not a design choice born from strong security -- it is a consequence of not having a proper key management system.

Vaultaire provides a BIP-39 recovery phrase at vault creation. This is a standard from the cryptocurrency world, battle-tested across billions of dollars in value. The recovery phrase can reconstruct your encryption key without the developer ever having access to it. Zero-knowledge recovery: you can get your data back, but nobody else can.

What Secret Photo Vault Users Say

Just a password on a folder

"Just a password on a folder."

Vaultaireのアプローチ: Vaultaire does not password-protect folders. It encrypts each file individually with AES-256-GCM. The pattern is not a password -- it is the seed for a hardware-backed encryption key.

Files visible through iTunes

"Files visible through iTunes."

Vaultaireのアプローチ: Files on disk are AES-256-GCM ciphertext. Connecting to iTunes or any file browser reveals encrypted blobs. No image headers, no readable content, no metadata leaks.

Constant advertisements

"Ads constantly."

Vaultaireのアプローチ: Zero ads across all tiers. No ad SDK in the binary. No network calls to advertising infrastructure. Privacy and advertising are fundamentally incompatible.

No backup, lost everything

"No backup, lost everything."

Vaultaireのアプローチ: Encrypted iCloud backup preserves your vault through device changes and resets. The data is encrypted before it leaves the device. BIP-39 recovery phrase provides an additional safety net.

No recovery for forgotten password

"Forgot password, no recovery."

Vaultaireのアプローチ: BIP-39 recovery phrase generated at vault creation. Twelve words that can restore your entire vault on any device. Write them down once; recover any time.

Encryption Keys, Not Passcodes

A passcode locks a door. An encryption key makes the contents unreadable. Vaultaire uses AES-256-GCM with hardware-backed keys so your files are protected by cryptography, not access control.

Vaultaireをダウンロード

その他の比較