Threshold Cryptography (vetKeys)
Your encryption key is computed on-demand by 13-34 independent nodes. No single node ever knows the full key. No passwords to lose.
No passwords. No master keys. Your files are protected by mathematics, not promises.
Your encryption key is computed on-demand by 13-34 independent nodes. No single node ever knows the full key. No passwords to lose.
Each user gets their own smart contract on the blockchain. After deployment, Rabbithole removes itself — you are the sole controller.
Each file is encrypted with a unique key. Compromising one file doesn't affect others. Sharing doesn't require re-encryption.
Sign in with Internet Identity — passkeys, biometrics, or social login. No email, no passwords, no credential databases.
Stored on Internet Computer canisters — no centralized servers, no single point of failure. Data persists even if Rabbithole disappears.
Every line of code is auditable. Verify the encryption, the key derivation, and the access control yourself.