Account Management
Billing and Subscriptions
Referral and Incentives
Community and Support
About Secrets Vault
Frequently Asked Questions
Frequently Asked Questions for New Users
- What is Secrets Vault?
Secrets Vault is a secure platform designed to access, safeguard and share sensitive information using advanced cryptographic techniques, in a really user-friendly way. It utilizes visual cryptography based on homomorphic encryption (HE), zero-knowledge proofs (ZKP), and multi-party computation (MPC) to ensure data protection and privacy. Although it may seem we are hiding secrets within images. we are not properly using steganographic techniques, as we are not altering image contents nor metadata.
About Secrets Vault
- What is Secrets Vault?
Secrets Vault is a secure platform designed to access, safeguard and share sensitive information using advanced cryptographic techniques, in a really user-friendly way. It utilizes visual cryptography based on homomorphic encryption (HE), zero-knowledge proofs (ZKP), and multi-party computation (MPC) to ensure data protection and privacy. Although it may seem we are hiding secrets within images. we are not properly using steganographic techniques, as we are not altering image contents nor metadata.
- Who is behind Secrets Vault?
Limitless Technologies and Applications S.L. (also known as LTA Labs) is the company behind Secrets Vault, specializing in developing innovative solutions for secure data safeguarding, data access and management. Their focus is on integrating cutting-edge cryptographic technologies to enhance security in the digital space.
- Who is behind the Visual Cryptography protocol?
The protocol is developed by a team of experts in cryptography, cybersecurity and blockchain technology. You can find more info about the mastermind behind it in this link: https://secretsvault.xyz/team/.
About Visual Safeguard
- What is the main value proposition of Secrets Vault?
Secrets Vault provides a novel mechanism to prevent wallet loss and protect sensitive information without requiring custodial services or multiparty computation (MPC) operations. It´s chain-agnostic and wallet-agnostic, making it compatible with all existing chains and wallets. Additionally, users do not need to remember passwords or seed phrases, only needing to store an innocuous image.
- How secure is this visual mechanism?
The visual mechanism employed by Secrets Vault is extremely secure. Secrets Vault employs multiple layers of security, including end-to-end encryption, homomorphic encryption, secret sharing and ZKP. Sensitive data never leaves your device (e.g., your phone), being encrypted locally, so its only accessible by you. This approach ensures high levels of security and privacy.
- Can I use this technology to safeguard other information?
Yes, the technology can be used to safeguard various types of information beyond wallet keys. Users can store any sensitive data securely using the same robust mechanisms provided by Secrets Vault.
- I want to integrate this protocol in my blockchain/Dapp/App. How can I reach you?
To integrate the protocol (the SDK) into your blockchain, Dapp, or App, you can contact Secrets Vault directly through our official communication channels, so we can share with you the technical information. Integration is as simple as two Javascript function calls.
- I have great ideas on what to use your Visual Cryptography protocol for…. How can I reach you?
If you have innovative ideas for using our Visual Cryptography protocol, you can reach out to Secrets Vault through our official contact channels.
- What are the license terms and conditions for using Secrets Vault?
You can find them on our website: https://secretsvault.xyz/licensing-conditions/
Security FAQs
- What is Visual Cryptography and how does Secrets Vault use it?
Visual Cryptography is a cryptographic technique that uses images to encrypt and/or decrypt information. A common example involves manipulating two separate images that, when overlaid, reveal a hidden secret—creating a visual-based secret-sharing scheme. However, traditional visual cryptography often struggles with resilience to image modifications such as resizing, compression, or watermarking, typically requiring unaltered images for accurate secret recovery.
At Secrets Vault, we leverage this concept of image-based secret protection but have adapted it for resilience against image modifications. Rather than relying on exactly the original image for recovering the information, we compute an invariant version of the image that remains consistent despite typical alterations. This invariant enables our secret protection algorithm to withstand common changes that occur when images are stored or shared on external platforms (e.g., social networks). Consequently, even if the original image undergoes compression or resizing, secrets can still be accurately recovered.
- What is steganography and why are we NOT using it (although it may look so)?
Steganography, like cryptography, is a technique within the field of information security, focused on protecting data (secret) by hiding it within another medium, such as an image or file. To achieve this, the medium is manipulated in a way that makes the embedded secret undetectable to anyone with access to the altered medium. A common example is modifying the least significant bits of an image’s pixels to hide “identifiers” for purposes like fingerprinting or watermarking. The primary goal of steganography is to keep the secret undetectable, with algorithms dedicated to identifying areas in the medium that can be subtly altered to achieve maximum invisibility. While these alterations may remain invisible to the human eye, advancements in computer vision and AI have made detecting such modifications increasingly feasible, requiring resource-intensive AI algorithms for effective hiding the secret against these attacks.
At Secrets Vault, we deliberately chose not to manipulate images to hide information, and therefore, our approach cannot be properly classified as steganography. Instead, we follow a visual cryptography approach—specifically, a secret-sharing scheme. In our method, images are not used as a container for hidden information, as in steganography. Rather, an image (the ‘Keepic’) serves as one of the essential shares in a cryptographic secret-sharing protocol used for protecting a secret.
- Why use images?
One common way to protect sensitive information is by encrypting it with keys created from passwords. This method, called Password-Based Key Derivation, is used to secure things like files or digital certificates. Typically, a secure key length of at least 128 bits is recommended. But in encryption, it’s not just about the key length; it’s also about how strong the password is that generates the key. For example, if a key has 128 bits but is generated from a password with only 50 bits of strength, the security is limited to 50 bits, making it easier to break. This is why passwords need to be both long and complex to provide the best protection—ideally, they would reach a security level close to 128 bits.
However, making passwords secure enough often means they become harder to remember. For example, using uppercase and lowercase letters, numbers, and a few special characters, each character adds about 6 bits of strength. To reach 128 bits, a password needs at least 21 characters, which results in something difficult to memorize, like ‘jlE5FSPTT7fi4YnZ63Xy2.’
Could an image serve as an alternative? In terms of security, an image is made up of many pixels, with each pixel containing color information. Even a small 200 x 200 image, for example, can provide up to 120,000 bits of potential security—nearly 1,000 times the security of a long password. This shows that images could be a strong alternative to long, complex passwords.
- Are we robust against image alterations?
Yes, as long as alterations don’t significantly change the core of the image (e.g., resizing rather than cropping). Our protocol is designed to withstand common image manipulations encountered when storing or sharing images on external platforms like social networks.
Unlike other methods, where even a single pixel change can prevent recovery, Secrets Vault’s technology processes the image to extract unique, invariant information. This ensures that typical modifications like compression, resizing, or watermarking won’t hinder recovery. This approach makes storing and sharing your Keepic more flexible and secure than encrypting it directly with a derived key.
- Are there any limitations for the secret?
No, our cryptographic scheme has no specific limitations on the type or length of the secret. However, technical constraints on the client device performing the cryptographic operations may apply. Currently, we limit the secret size to 8 megabytes for browser clients, but we aim to increase this to around 100 megabytes soon.
- Is there a limit to the size of the image used?
The only limitation is on the minimum image size to ensure sufficient bits can be extracted for secure protection. The current lower limit is 50,000 pixels (approximately a 224×224-pixel image). While we may reduce this limit in the future, it’s already low enough given that most images used today exceed this size. For example, a VGA-resolution image (640×480 pixels) has over 300,000 pixels.
- Does security strength depend on image size?
No. Our scheme is designed to maintain its security strength regardless of the image size, allowing you to resize the original image (Keepic) without compromising security. We currently set the minimum resize limit at 50,000 pixels (e.g., 224×224 pixels) to ensure 256-bit quantum-resilient security. We are working to further enhance and potentially reduce this limitation in future versions.
- Can I recover my secret if I do not have my Keepic?
The Keepic is essential for recovering your secret; without it, recovery is impossible even with access to the Kvault. Losing the Keepic is like losing the keys to an encrypted secret. We recommend keeping several copies of the Keepic in different, reliable locations. Since the Keepic can be any public image, you could choose one that is widely accessible (e.g., a museum painting) or store it on public platforms or social media without concern for compression or resizing. Since the Keepic itself is unaltered, it’s indistinguishable from standard images, making it blend seamlessly among publicly available or shared images.
- Can someone recover the secret from the Kvault?
No, the Kvault alone isn’t enough to recover the secret. It’s created through a secret-sharing method that also requires the Keepic to complete the recovery. This makes Kvault safe to store with a trusted third party if needed. To protect your secret, it’s best to keep the Keepic and Kvault separate, as having both allows full recovery—similar to storing an encrypted file alongside its password. The Kvault on its own doesn’t reveal any information about the secret, so there is no risk of security compromise.
Currently, Secrets Vault also stores a Vault share needed for recovery, making the process easier for users. However, we’re developing a decentralized storage system with Multi-Party Computation, which will make storing and retrieving the Vault share even more secure and resistant to interference.
- Where are secret protection processes executed?
Our cryptographic scheme is designed to execute entirely on the user’s device, ensuring that neither the secret nor the Keepic is ever exposed to third parties. The only component that leaves the user device is the Kvault, which is securely custodized by the Secrets Vault platform. Along with the Kvault, a Keepic commitment is sent to Secrets Vault for future retrieval. This commitment enables Secrets Vault to validate a zero-knowledge proof provided by the user before releasing the Kvault, confirming that the user has the correct Keepic without revealing it. This setup ensures that the Keepic remains private and prevents impersonation attempts by unauthorized users.
- Do I need to use exactly the same image to recover my secrets?
No, you don’t need to use the exact same image to recover your secrets. Secrets Vault’s technology goes beyond a simple hash by extracting the unique "DNA" of your image, which allows for a degree of flexibility. This means that modified versions of your original Keepic—such as those with slight compression, resizing, or watermarking—can still be used to successfully recover your secrets. This flexibility makes it easier to store and share your Keepic without compromising security.
- How is each image encrypted differently? Can I run someone else’s image through and steal their secret out of it?
We do not encrypt images; instead, we use the image you provide, known as the Keepic, to securely hide the information. This process generates a random image key directly on your device, ensuring it is unique to each hiding operation. Because the key is entirely random and specific to the process, even if someone uses an identical image from another user, it remains impossible to extract or steal their secret.
- Do any other parameters (title, time of creation) affect the uniqueness of the picture?
No, we work exclusively with the intrinsic "DNA" of the image itself, without relying on metadata or filenames, such as the title or creation time. Any changes to this external information have no impact on the process or the ability to recover the secret.
- What about using a seed phrase to generate a unique pattern image for encryption?
This is an interesting idea, but it does not solve the problem we are focusing on: how can we recover the seed phrase if we lose the wallet.
This approach is focused on encrypting a secret using a pattern image generated the seed phrase. Since the pattern image is ephemeral (it is not stored after using it for encrypting), you need the seed phrase to reconstruct again the pattern image for decrypting. Our proposal complements yours, since allow to recover the seed phrase in case you lose the wallet, and allows you to decrypt information in the future.
- What is FHE and how do we use it?
Fully Homomorphic Encryption (FHE) is a form of encryption that allows computations to be performed on ciphertext, generating an encrypted result that, when decrypted, matches the result of operations performed on the plaintext. Secrets Vault uses Partial HE to ensure that sensitive data can be processed without ever exposing the actual data, enhancing security and privacy.
- What is ZKP and how do we use it?
Zero-Knowledge Proofs (ZKP) are cryptographic methods that allow one party to prove to another that a statement is true without revealing any information beyond the validity of the statement itself. Secrets Vault employs ZKP to verify user credentials and data integrity without compromising user privacy.
- What is MPC and how do we use it?
Multi-Party Computation (MPC) is a cryptographic protocol that enables multiple parties to jointly compute a function over their inputs while keeping those inputs private. In Secrets Vault, MPC is used to enhance the security of data storage and access, ensuring that no single party can compromise the stored data.
About using Secrets Vault
- Why is my Keepic unsuitable?
When creating a new secret, it is possible to encounter an error when you try to submit an image to use as your Keepic. This can mean one of a few things:
- Size: If the image is too small, it won’t provide enough entropy.
- Uniformity: Images with large flat backgrounds or very few colors are less robust.
- Transparency: Transparent images or those with large uniform areas may not work well.
Check out our Knowledge Base to find out how to choose a good Keepic.
- I lost the image I used to safeguard a secret. Can I recover the secret somehow?
Secrets Vault provides an easy yet secure mechanism to safeguard data, but it is auto-custodial, meaning that only you can recover it. Unfortunately, if you lose the image used to safeguard a secret, we cannot recover it for you. To prevent such a loss, we strongly recommend making multiple copies of your images and storing them on different devices. You can also share them with trusted family and friends via messaging applications or post them on social media, provided they are innocuous images that cannot be linked back to your secret.
- I lost access to the authentication factor mechanism (e.g. my Gmail account). Can I recover the secret somehow?
In the current version, your secrets are anonymously linked to your authentication factor. This means you cannot recover your secrets without access to it. In future versions, we plan to allow users to link multiple authentication factors to a single anonymous identity, enabling the recovery of secrets through any of the linked factors.
- Why is authentication factor “xxx” not available?
There are many options for authentication factors, and the most common ones will be progressively added to Secrets Vault, including authentication via other social logins, Telegram, or Web3 wallets. Follow us on our communication channels to get the latest updates on available authentication methods.
- What are some recovery options if a person lost their device?
Provided the user has access to a copy of the image used to hide her secrets, and access to the login credentials used in such operation (e.g., a Gmail account), the recovery options are 100% guaranteed from any other device.
- Can I recover a secret I created via a wallet from the Portal, and vice versa?
No, this cannot be done. In Secrets Vault, you will be represented as two different anonymous users, even if you use the same authentication factor for both the wallet and the Portal.
- I do not see a secret shared with me!
Secrets shared with you will appear in the Received tab on the left hand menu. If a secret is not showing up in that page, it could be for one of the following reasons:
- The secret is public, which means it wasn’t shared with you specifically, but can still be accessed through the public link.
- The owner of the secret has deleted it.
- The owner has removed you from the list of people able to access the secret.
- Can I print my Keepic and use it later?
No. Printing your Keepic and then scanning or photographing it will not work for secret recovery. The system requires a digital version of the original Keepic—meaning modifications like printing and rescanning will break its ability to function.
Your Keepic remains effective even if it undergoes compression, resizing, or watermarking—as long as it is still a digital image derived from the original. As your Keepic does not contain the secret itself and remains indistinguishable from any regular image, this means you can safely store it in social media, cloud storage, or any public archive.
- How do I add the Secrets Vault app to my phone?
Here you can find instructions to set up the web app on your phone's home screen depending on which browser you use.
Subscriptions
- Do all plans include the same level of security?
Yes, all plans are protected with advanced encryption and image-based security to ensure your secrets are safe.
- Can I upgrade or downgrade my plan at any time?
Yes, you can switch between plans at any time. Upgrades take effect immediately, while downgrades will apply at the end of your billing cycle.
- What happens to my data if I cancel my plan?
For Premium or Standard users, your account will revert to the limits of the Free plan, as long as your data usage stays within those limits. If your usage exceeds the Free plan’s limits, your account will be temporarily suspended until the conditions are restored.
In the event of full account cancellation, any data required to recover your Secrets will remain securely stored for a limited time before being permanently deleted to ensure your privacy and security.
- Are there any special offers for the Standard & Premium plan?
Yes, we’re offering an exclusive 40% launch discount on the Standard & Premium plans. Also, you may benefit from different discounts and rewards during our launch campaign, so pay attention to our socials, and don’t miss the chance to secure advanced features at a reduced price!
- What makes Secrets Vault different from other platforms?
Secrets Vault replaces traditional passwords with image-based security, offering a seamless, innovative, and highly secure way to protect and share your sensitive information.
Referral Program
- How do I access my referral code?
You can find your Secrets Vault referral code in the Settings section of your account. Simply copy and share it with your friends!
- How are referral credits applied?
Credits earned through the Referral Program can be used for subscription renewals and to unlock extra features in Secrets Vault in the future.
- Is there a limit to how many referrals I can make?
No! The more you share Secrets Vault, the more referral rewards you earn. There is no limit to how many people you can refer to.
- When do I receive my referral credits?
Referral credits are applied once your friend completes their first payment. You’ll see your credits reflected in your account balance.
- Do my friends need to use my referral code to get the discount?
Yes, your friends must sign up using your referral code or referral link to receive the 15% discount on their first billing cycle.
Rewards Hub
- How do I check how many lottery tickets I have?
Your identity is secure! Only your username will be shown on the Secrets Vault Rewards Hub leaderboard, which updates regularly to display your current count of lottery tickets.
- Can I obtain multiple lottery tickets?
Yes, there’s no limit! The more you engage, the better your chances of winning. The more you refer, share secrets, and participate in promotions, the better your chances of winning.
- When are the Secrets Vault Sweepstakes draws held?
Our sweepstakes draws take place every three months, with winners announced on our platform and social media.
- How will I know if I’ve won?
We will announce the winners on our website and social media channels. Winners will also be notified directly via email.
- Do my Secrets Vault Rewards Hub lottery tickets expire?
Your tickets are valid for the current sweepstakes until the draw ends. After each draw, tickets reset and a new cycle starts. To participate in the new cycle, you will need to get new tickets.
- What happens if I only have one ticket?
Even one ticket gives you a chance to win, as every participant enters the randomized draw. Obviously, the more tickets you have, the more chances you have.
- Which are the terms & conditions that regulate my participation?
You can find here our Terms and Conditions for Secrets Vault Promotions.