pull down to refresh

Live Demohttp://fyvqqsnckrthn6z3xfvothtwwxczoxzefoe2jf64kvxxs26cxzuneqad.onion

What is Shadow Vault?

Shadow Vault is an enterprise-grade, zero-knowledge file storage system built specifically for the Tor network. This isn't a patched-together script; it’s a high-performance "digital fortress" written in Golang v1.22 and Svelte. It combines military-grade encryption—using SQLCipher, Argon2id, and raw mlock system calls—with built-in failsafes like Dead Man's Switches and Canary Traps. It’s designed to be a "weaponized business model": a secure storage SaaS that you can deploy in an afternoon and immediately start monetizing via integrated Monero subscriptions.

20,000+ Lines of Clean, Commented Code
This is a professional-grade codebase, not a weekend hobby project.
Fully Commented: With over 20,000 lines of code, I’ve made sure every security-critical function and memory-clearing loop is documented. You’ll know exactly how the data moves.
Technical Whitepaper: I’m including a deep-dive README and a technical whitepaper that covers the cryptographic handshake, the logic behind the memory pinning, and the Docker orchestration.
Instant Deployment: You get the full source code, but I’m also providing a pre-built Docker TAR image. If you want to skip the compiling and go live in seconds, just load the image and run.

The Dual-Frontend Philosophy
I spent months building two separate frontends because "one size fits all" doesn't work for Tor users:
The Power User (Svelte UI): Optimized for speed. It uses JS to detect if a file exceeds a user's quota before they waste 20 minutes uploading. It’s fluid, has real-time progress bars, and feels like a premium modern app.
The Ghost (Zero-JS Mode): Pure HTML/CSS for the paranoid. No scripts, no XSS vectors, and zero fingerprinting. It works perfectly even on Tor’s "Safest" setting.

Turn it Into Monthly Revenue (Tiered Pricing)
The backend is engineered for recurring revenue. You can act as the service provider and set your own tiers:
Feature Locking: You decide what’s free and what’s premium. You can lock the "Life Insurance" features (DMS and Canary Traps) behind XMR paywalls with a simple config toggle.
Auto-Billing: It talks directly to monero-wallet-rpc. Users send XMR to a unique subaddress, the backend detects it, and their storage or premium features unlock automatically.
Auto-Sweep: All income is automatically swept to your cold wallet. You keep the profit; the server just handles the tech.

 The "Nuclear" Failsafes
Dead Man’s Switch (DMS): If a user misses their check-in interval, the vault nukes their session keys and wipes their files.
Telegram Delivery: Since Telegram bots can't message users first, users interact with @shadow_vaultbot during setup to "open the gate." Once that's done, the DMS fires the alert flawlessly if they go dark.
Email Delivery: Fires the recovery link via a Tor-proxied SMTP relay immediately. No hurdles.
Canary Traps: Tripwires in the filesystem. If a rogue admin or forensic tool "touches" a decoy file on the server, the system flags the breach and alerts the user at their next login.

No Backdoors. No Bullshit.
I’m selling the full source code because transparency is the only way to prove there are no backdoors.
Memory Armor: We use raw mlock calls to pin encryption keys to active RAM so they never hit the hard drive's swap partition. SecureZero aggressively wipes buffers the second they aren't needed.
Zero-Knowledge: Everything is encrypted at rest. Even as the admin, you see nothing but encrypted blobs.
What you get: Full Go/Svelte source, Technical Whitepaper, 3-stage hardened Docker builds, and the pre-compiled Docker TAR image.

Serious inquiries only.

no foss?

reply

Wish I could make it open source been working on it for a while and I wanted to make money out of it