OmniVault
Open classified documents on any machine. Close the binary. It never existed.
The Problem
Classified documents are handled through cloud workspaces, encrypted volumes on disk, or specialized laptops. Each approach leaves traces: volume files, swap data, temp files, OS logs. A forensic examiner can recover data from any of these surfaces.
The Solution
OmniVault is a ~40KB encrypted workspace that lives 100% in RAM. Keys are generated at runtime and exist only while the process runs. On termination — kill, power loss, anything — keys are destroyed and RAM is overwritten with zeros. Data never touches disk because there is no OS managing swap or temp files.
Why Bare-Metal Matters
Conventional encrypted workspaces rely on the OS for memory management, which means swap files, temp directories, and system logs can leak data. OmniVault bypasses the OS entirely. There is no /tmp, no logs, no journald. A post-mortem RAM dump finds only encrypted bytes without keys.
Technical Specifications
| Feature | Value |
|---|---|
| Binary Size | ~40KB |
| Encryption | AES-256 / ChaCha20 |
| Storage | RAM only — never touches disk |
| Key Management | Runtime-generated, destroyed on exit |
| Dependencies | None |
| Swap | None — no OS managing virtual memory |
| Post-mortem | RAM overwritten with zeros |
Comparison
| OmniVault | VeraCrypt | Citrix Secure Workspace | |
|---|---|---|---|
| Size | ~40KB | 30MB + OS | Cloud-based |
| Data on disk | Never | Encrypted volume on disk | Cloud servers |
| Dependencies | None | OS + drivers | Browser + cloud infra |
| Post-exit trace | Zero (RAM wiped) | Volume file remains | Session logs in cloud |
| Supply chain CVEs | 0 | OpenSSL + OS stack | Hundreds |
| Offline operation | Yes | Yes | No |
Use Cases
Legal Discovery & M&A
Attorneys review sensitive documents in a workspace that ceases to exist when closed. No files on disk. No browser cache. No cloud trail.
Healthcare Records
Physicians access patient records in a volatile workspace. HIPAA compliance is inherent — data cannot persist because the mechanism for persistence does not exist.
Classified Government Documents
Any laptop becomes a secure terminal. Boot, read, close. The machine returns to its original state with zero forensic trace.