UTS Vault Enterprise Logo UTS Vault Enterprise
  • Features
  • Security
  • Pricing
  • Support
  • Privacy
  • Terms
← Back to Home

Privacy & Security

Privacy Guarantees

Local Encryption

All file encryption happens locally on your device using AES-256-GCM. Your files never leave your computer unencrypted.

No File Upload

Only cryptographic hashes (SHA-256) are sent to the ledger. Your actual file contents are never uploaded or transmitted.

Original File Deletion

After encryption, the original file is automatically deleted for security. Only the encrypted version remains on your device.

Key Management

Encryption keys are generated locally and stored securely on your device. Keys are never shared or transmitted.

Zero-Knowledge

The ledger service cannot see your file contents, file names, or any metadata. Only anonymous hashes are stored.

Password Manager Security

Your password vault uses zero-knowledge architecture. Master passwords and plaintext credentials never leave your device. Only encrypted blobs are stored.

Password Generator Privacy

Generated passwords are never stored or transmitted. Only password hashes (SHA-256) are sent to the ledger for proof-of-generation. Plaintext passwords never leave your device.

Security Features

AES-256-GCM - Bank-Grade Encryption

Files are encrypted using AES-256-GCM, an authenticated encryption algorithm approved by NIST and used by banks, financial institutions, and governments worldwide.

SHA-256 - Cryptographic Hashing

File hashes are computed using SHA-256, a cryptographically secure hash function resistant to collisions and preimage attacks.

Ed25519 - Digital Signatures

All ledger records are signed with Ed25519 signatures, providing cryptographic proof of authenticity and integrity.

Hash Chaining - Tamper-Evident Ledger

Each record is cryptographically linked to the previous one, creating an immutable chain that detects any tampering.

Append-Only - Immutable Records

The ledger is append-only. Records cannot be modified or deleted, ensuring permanent proof of timestamp.

How It Works

1. Local Encryption

You select a file. The app encrypts it locally using AES-256-GCM with a randomly generated key. The encrypted file is saved on your device.

2. Hash Computation

The app computes a SHA-256 hash of the encrypted file. This hash is a unique fingerprint that cannot be reversed to reveal the file contents.

3. Proof Generation (Optional)

If you choose to generate a proof, only the hash is sent to the ledger. The ledger creates a timestamped, signed record and returns proof details.

4. Independent Verification

Anyone can verify your proof by checking the hash in the ledger, validating the signature, and confirming chain integrity.

Data Collection

License Information

We collect activation keys and device identifiers for license verification. This information is used only to validate your license and provide support.

Usage Statistics

We do not collect personal information, usage statistics, or analytics data. All operations happen locally on your device.

Password Data

We never collect, store, or transmit plaintext passwords. Password Manager uses zero-knowledge encryption, and Password Generator only stores cryptographic hashes.

Important Notes

  • Backup Your Keys: If you lose your encryption keys, you cannot decrypt your files. Keep backups in a secure location.
  • Encrypted Files: Encrypted files (.encrypted extension) are required to decrypt. Do not delete them.
  • Master Password: If you forget your Password Manager master password, we cannot recover your vault. This is by design for maximum security.
  • Proof Independence: Cryptographic proofs can be verified independently without this application.
  • No Recovery: The ledger service cannot recover lost files or keys. This is by design for maximum security.
  • License Activation: License information is stored locally on your device. Activation keys are verified online but not stored on our servers after verification.

Contact Information

If you have any questions about our Privacy Policy or security practices, please contact us at:

  • Email: support@kaanuluer.com

Last Updated:

UTS Vault Enterprise UTS Vault Enterprise

Enterprise-grade password management and encryption software. Built with security-first principles.

Product

  • Features
  • Security
  • Pricing

Legal

  • Privacy Policy
  • Terms & Conditions

Support

  • Contact Us
  • Support

© 2025 UTS Enterprise. All rights reserved.