Built for people who take
privacy seriously.
Every feature in NeuroKey exists for one reason: to keep your data under your control, forever.
Military-grade AES-256, utilizing Native Device Cryptography.
Every byte in your vault is encrypted with AES-256 before it's ever written to disk. The key is derived from your biometrics via PBKDF2 with 5,000 iterations — making brute-force computationally infeasible.
- AES-256 with a fresh random IV for every encryption
- PBKDF2 key derivation with SHA-256 and 5,000 iterations
- Authentication tag detects any ciphertext tampering
- Zero network calls — all cryptography happens locally
// AES-256 — authenticated encryption via Expo const key = await deriveKey(biometricHandle, salt, 5_000); const iv = await Crypto.getRandomBytesAsync(12); const ciphertext = await AES.encrypt(key, iv, vaultData); // Hardware-accelerated ✓
Your fingerprint is the key. Literally.
NeuroKey derives your encryption key from a biometric handle stored in the device's Secure Enclave. That handle never leaves the chip, and NeuroKey never sees your biometric data — it only sees the unlocked key.
- Face ID and Touch ID supported natively
- Biometric data stays in the Secure Enclave — always
- NeuroKey receives only a derived key handle, not your biometric
- Master password is never stored in plaintext; used exclusively for secure key derivation
Touch to Unlock
Place finger on sensor
Store your cards with the same security as your passwords.
NeuroKey's Digital Wallet lets you store credit, debit, and loyalty cards with full details encrypted at rest. Cards are rendered with a beautiful, customisable interface and accessible in seconds with biometric auth.
- Full card details: number, CVV, expiry, notes
- Beautiful gradient card UI with customisable colour
- All card data encrypted with the same AES-256 vault
•••• •••• •••• 4242
Cardholder
AYOUB E.
Expires
12/27
•••• •••• •••• 8181
Cardholder
AYOUB E.
Expires
08/28
All card data encrypted at rest · never synced
Know if you've been compromised, without exposing a single byte.
NeuroKey checks your passwords against the Have I Been Pwned database using the k-anonymity model. Only the first 5 characters of a SHA-1 hash are transmitted — your actual password is mathematically impossible to derive from that.
- k-anonymity: only 5 SHA-1 prefix characters transmitted
- Checks against billions of known leaked credentials
- Runs on demand — never automatic background syncing
- Displays breach count and severity for each match
Breach Radar Scan
k-anonymity model — your passwords never leave your device
Zero cloud. Zero servers. Zero breach surface.
NeuroKey makes no network connections to store or retrieve your vault. Your data lives exclusively on your device. Backups are manual encrypted exports that you control. There is no server to breach.
- No account registration — no email, no password, no profile
- Zero analytics, zero telemetry, zero tracking of any kind
- Upcoming encrypted export for manual backups. to any storage you trust
- Works fully without an internet connection, always
How NeuroKey compares
Different tools make different trade-offs. Here's an honest comparison.
◐ = some providers only
Ready to take back control?
NeuroKey is free, open-source, and installs in under a minute.