Security That's Actually Secure
Quantum-ready encryption. Zero-knowledge architecture. Audited by experts.
Security That's Actually Secure
We use NIST-standardized post-quantum cryptography. Your data stays secure for decades.
File encryption standard
Post-quantum key exchange
Password hashing
Uptime SLA
Our Security Architecture
Client-Side Encryption
All files are encrypted on your device before upload using AES-256-GCM. Your encryption keys are derived from your password using Argon2id (64MB memory, 3 iterations) and never leave your device.
Password → Argon2id → Master Key → HKDF → File Keys Each file encrypted with unique 256-bit key IV: 96-bit random nonce per file Auth: 128-bit GCM authentication tag
Post-Quantum Cryptography
We use NIST-standardized post-quantum algorithms to protect against future quantum computing threats:
-
Kyber-1024 (ML-KEM)
NIST FIPS 203 - Key encapsulation mechanism for quantum-safe key exchange
-
Dilithium5 (ML-DSA)
NIST FIPS 204 - Digital signatures for long-term data integrity
-
Hybrid Approach
Combines classical (X25519, Ed25519) with post-quantum for defense-in-depth
Security Audits
RacterVault undergoes regular third-party security audits:
Cryptography Audit
NCC Group - Annual
Comprehensive review of encryption implementation and key management
Penetration Testing
Trail of Bits - Bi-annual
Infrastructure and application security assessment