Zero Knowledge Architecture

Encryption you control.
Math you can trust.

A web-native secret manager using industrial-grade RSA encryption. No extensions to install, no apps to track you—just pure, end-to-end security in your browser.

AWS Production Root

Infrastructure / Core

AC
SM
JS
+4
admin@hplix.com
••••••••••••••••••••
592 103
End-to-End Encrypted
Last accessed 2m ago

Your Master Key never leaves your sight.

We don't just 'promise' privacy; our architecture makes it physically impossible for us to read your data. We host the bits, but you hold the keys.

Public Key

Stored on our servers. Anyone can use this to lock (encrypt) a message for you, but they cannot unlock it.

Private Key

Generated in your browser. Encrypted with your passphrase. Stored ONLY in your local session. Never sent to Hplix.

Save Recovery Key

This is your only backup. We cannot recover your account if you lose it.

RK-9A2B-X7Y8-4M1N
Generated locally

Secure access on any machine, instantly.

Because there is no extension or app, users can securely access their secrets from a library computer, a friend’s laptop, or a work station without leaving a digital trail.

Zero Installation

Just log in, decrypt, and get to work. No admin rights required.

Session Wipe

When you close the tab, your session and keys are instantly wiped from memory.

Any Device

Optimized for desktop, tablet, and mobile browsers.

JD
Sharing with
Sarah Connor
// Re-encrypting for Sarah's Public Key
0x4f9a...e2b1

Share secrets without sharing passwords.

Send sensitive credentials to teammates without ever revealing your own master password or using insecure 'sharing links'.

  • Asymmetric Power

    We use the recipient's Public Key to encrypt the data. Only they can open it.

  • Audit Logs

    See exactly who accessed what secret and when.

Reducing the Attack Surface

Why we built a No-Extension security model.

Browser extensions can be vulnerable to side-channel attacks or browser-level tracking. By staying web-native, we eliminate the risks associated with third-party app stores and extension vulnerabilities. It’s just you, your browser, and the RSA protocol.

No Auto-fill hijacking
No 3rd party store review

Frequently Asked Questions