Built by Flowdesk — ex‑FlowCrypt (iOS + Chrome Ext.). Privacy apps, E2EE systems, native & mobile.See workcontact@flowdesk.tech
Flowvault

Use case

Notes you can unlock without proving what else exists.

Most encrypted notepads protect you from the server. Flowvault also helps when the attacker is standing next to you and asking for a password. A decoy password opens a real-looking notebook while your real notes stay unprovable.

One URL can hold multiple independent notebooks.
Wrong, empty, and other-password slots fail the same way.
The server sees one opaque ciphertext blob, not your notebook list.

30-second proof

Feel plausible deniability before you trust the claim.

Open the same demo vault twice: first with CorrectPassword, then lock and unlock with DecoyPassword. Same URL, same ciphertext on the server, two completely different notebooks.

What plausible deniability means here

Flowvault does not just encrypt note contents. It also avoids a visible note list, active-slot bitmap, or metadata trail proving how many notebooks exist. Different passwords derive different slot indexes; each successful password opens its own workspace at the same URL.

What it does not hide

Flowvault hides what is inside the vault and whether another notebook exists in the same blob. It does not hide that someone visited your chosen URL from a network observer. If vault existence is dangerous in your threat model, read the security page before relying on it.

Good decoys are boring

The best decoy notebook is not theatrical. It looks like something a normal person would actually keep: shopping lists, harmless notes, a recipe, travel logistics, or low-stakes reminders. The demo's DecoyPassword vault is intentionally boring for that reason.

Why the demo matters

This feature is easy to over-explain and hard to trust from copy alone. The public demo makes the claim tactile: same URL, two passwords, two different screens. That is the product's core conversion moment.

Set up a deniable vault

  1. 1Pick a URL slug that does not reveal the real subject.
  2. 2Create the real password first and save the real notes.
  3. 3Lock, then create a decoy password with plausible low-stakes content.
  4. 4Practice unlocking both so you understand the flow before you need it.
  5. 5Export an encrypted backup and store it separately.

Trust signals worth checking

Flowvault is MIT-licensed and open end-to-end: frontend, Cloud Functions, Firestore rules, and crypto code are public. The server stores opaque ciphertext; your password and plaintext stay in the browser.