A complete technical breakdown of the post-quantum hybrid encryption pipeline, key management, and signature verification system.
QSafe Vault uses a hybrid post-quantum encryption scheme. ML-KEM handles key encapsulation (protecting against quantum attacks on key exchange), while AES-256-GCM handles the actual file encryption (fast and proven).
What QSafe Vault protects against โ and what it doesn't.
Every cryptographic operation โ key generation, encryption, decryption, signing, verification โ runs entirely within your browser using the Web Crypto API. Nothing is sent to any server.
Private keys exist only in browser memory during your session. When you close the tab, all key material is immediately garbage collected. No persistence, no leakage.
The entire application is a static HTML/JS/CSS bundle. You can inspect every line of code via browser DevTools. No obfuscation, no hidden network calls, no tracking.
Experience the full post-quantum encryption pipeline yourself.