~40KB

OmniVault

Open classified documents on any machine. Close the binary. It never existed.

Legal Healthcare Government

The Problem

Classified documents are handled through cloud workspaces, encrypted volumes on disk, or specialized laptops. Each approach leaves traces: volume files, swap data, temp files, OS logs. A forensic examiner can recover data from any of these surfaces.

The Solution

OmniVault is a ~40KB encrypted workspace that lives 100% in RAM. Keys are generated at runtime and exist only while the process runs. On termination — kill, power loss, anything — keys are destroyed and RAM is overwritten with zeros. Data never touches disk because there is no OS managing swap or temp files.

Why Bare-Metal Matters

Conventional encrypted workspaces rely on the OS for memory management, which means swap files, temp directories, and system logs can leak data. OmniVault bypasses the OS entirely. There is no /tmp, no logs, no journald. A post-mortem RAM dump finds only encrypted bytes without keys.

Technical Specifications

Feature Value
Binary Size ~40KB
Encryption AES-256 / ChaCha20
Storage RAM only — never touches disk
Key Management Runtime-generated, destroyed on exit
Dependencies None
Swap None — no OS managing virtual memory
Post-mortem RAM overwritten with zeros

Comparison

OmniVault VeraCrypt Citrix Secure Workspace
Size ~40KB 30MB + OSCloud-based
Data on disk Never Encrypted volume on diskCloud servers
Dependencies None OS + driversBrowser + cloud infra
Post-exit trace Zero (RAM wiped) Volume file remainsSession logs in cloud
Supply chain CVEs 0 OpenSSL + OS stackHundreds
Offline operation Yes YesNo

Use Cases

Legal Discovery & M&A

Attorneys review sensitive documents in a workspace that ceases to exist when closed. No files on disk. No browser cache. No cloud trail.

Healthcare Records

Physicians access patient records in a volatile workspace. HIPAA compliance is inherent — data cannot persist because the mechanism for persistence does not exist.

Classified Government Documents

Any laptop becomes a secure terminal. Boot, read, close. The machine returns to its original state with zero forensic trace.