One ledger, eight identities
Every sensitive field encrypted with AES-256-GCM, with its own random IV.
Secure your passwords, passkeys, 2FA, and bank cards with AES-256-GCM encryption. Local-first, optional iCloud sync.
Built on modern iOS primitives
Not a 'password app' — an encrypted ledger that consolidates every digital identity in one place. All eight item types go through the same field-level encryption pipeline.
Every sensitive field encrypted with AES-256-GCM, with its own random IV.
Scan to save. AutoFill fills the 6-digit code along with the password.
Random string or EFF wordlist phrase. Live entropy meter.
Generated and stored locally. Private key never leaves the device in plaintext.
Only the first 5 chars of the SHA-1 hash leave the device. Your password never does.
System-level AutoFill extension. Face ID confirms; codes get filled in too.
Routed via Apple's private CloudKit. Sensitive fields are encrypted on-device before upload — only ciphertext reaches the server. Toggle off anytime to go fully local.
1Password · Bitwarden · LastPass · KeePass · Dashlane · Apple Keychain. Three export formats: JSON / CSV (plaintext) + encrypted .bytegx.
Every password change saves the previous value — up to 5 history versions kept, one-tap rollback. Deleted items go to a recycle bin and clear after the retention window.
Pasteboard auto-clears across 5 presets (15-90s); foreground / background auto-lock configured separately (always-on, can't be disabled).
Two widgets: quick vault access + on-the-fly password generator.
Built-in TOTP, on-device security audit, and Passkeys — the three places where ByteGuard most clearly out-engineers the average password manager.
Scan to save — every 2FA in one place. The detail page shows the live code with a countdown ring; long-press to copy. With AutoFill, the code goes in along with username and password.
Backed by Have I Been Pwned with the k-anonymity protocol — only the first 5 chars of the SHA-1 hash ever leave the device. Every weakness comes with a concrete next step.
WebAuthn / FIDO2 standard. ES256 (ECDSA P-256, COSE alg -7). Private keys are AES-256-GCM encrypted with the Item Key — plaintext never written to disk. AutoFillExtension handles registration and assertion via the Apple system bridge.
Ten screens, in scenario order — the whole app walked through. No marketing copy.
Top 10 / All / Favorites / Logins multi-view; live filtered search. All eight DataType cases run the full field-level encryption pipeline — not a 'password app', but a digital-identity ledger.
Scan to save — every 2FA in one place. The detail page shows the live code with a countdown ring; long-press to copy. With AutoFill, the code goes in along with username and password.
Login detail: username, password, history, linked TOTP, website, custom fields. Each sensitive field independently decrypted with its own IV, shown only on demand. Copy auto-clears the clipboard.
Every change saves the previous value (spec:R3 — up to 5 versions kept); tap the timeline to restore. Deleted items are retained for 90 days before permanent removal.
Backed by Have I Been Pwned with the k-anonymity protocol — only the first 5 chars of the SHA-1 hash ever leave the device. Every weakness comes with a concrete next step.
Random (4-64 chars / exclude look-alikes / digits-only for PIN) or EFF passphrase, with live entropy meter. Replaces the old value and records the change in history.
AutoFill Extension uses Apple's official ASCredentialProviderViewController; after Face ID / Touch ID, the username, password and TOTP all go in together. Info.plist also declares SupportsSavePasswordCredentials, so new passwords save back to ByteGuard from any flow.
WebAuthn / FIDO2 standard. ES256 (ECDSA P-256, COSE alg -7). Private keys are AES-256-GCM encrypted with the Item Key — plaintext never written to disk. AutoFillExtension handles registration and assertion via the Apple system bridge.
Card number (PAN) gets its own AES-256-GCM key with a unique IV. Cardholder name, expiry, brand (Visa / Mastercard / etc.) stay searchable as metadata. CVV/CVC are never persisted on this device.
AppearanceMode three modes: system / light / dark — switch any time, no restart. Premium tier unlocks multi-color themes; Home Screen widgets stay in sync.
Your master password never leaves your device. Your Secret Key is generated locally and stored in Apple Keychain — synced across your Apple devices through Apple's end-to-end encrypted Keychain (you can also keep it on a single device). Both keys are required to decrypt your data, and neither I nor Apple can read either one. This isn't a promise — it's the architecture.
password + Secret Key + 32B salt → Master Key. Parameters: 64 MB memory · 3 iterations. Resistant to GPU/ASIC brute force.
Master Key → KEK → random DEK. Each vault gets its own DEK — no horizontal decryption path.
Every sensitive field encrypted independently · new random IV on every write. Same plaintext → different ciphertext · authenticated tag prevents tampering.
A random key (a 12-word BIP39 mnemonic in form), independent of the master password. Even if the master password leaks, your vault still cannot be opened without it.
No competitor table. No checkmarks. Just an indie developer listing — plainly — what I wrote, and what I deliberately didn't. Read it, then decide whether to trust me with your ledger.
Every sensitive field encrypted independently, with its own random IV.
64 MB memory × 3 iterations — resistant to GPU/ASIC brute force.
A random key independent of the master password — your second line of defense.
iCloud sync can be turned off in one tap; the app falls back to pure local storage.
Only the first 5 chars of the SHA-1 hash are sent — your password never leaves the device.
AutoFill, Passkey, and TOTP all use Apple's official APIs. No reinvented wheels.
No analytics. No tracking. No ads. No crash reporters.
XSS, extension supply-chain attacks, CDN takeovers — that surface is excluded by architecture, not policy.
Each platform means re-implementing the crypto primitives correctly. Get one line wrong and the whole chain breaks.
Sharing is trust delegation — I'm still working out how to do it right. Until I am, I won't ship it.
Under zero-knowledge, self-hosting just shifts the operational burden to you with no real security gain.
Honestly: I haven't paid for one yet. The /security page documents every crypto decision against the source so anyone can verify independently. Independent audit + open-sourcing the crypto core are both on the roadmap (target dates Q3-Q4 2026, will update if delayed) — follow the GitHub repo to be notified when they land.
If I could recover it, it wouldn't be zero-knowledge. The most reliable backup is still old-school: write your master password and Secret Key on paper and store them apart.
Crypto-related changes will move very conservatively. Stability over novelty.
No hidden fees. Subscribe monthly, yearly, or buy once for life. All billing handled by Apple.
I'm the developer behind ByteGuard, working on it solo. Background: I spent years building payment systems — from core transaction logic to payment gateway integrations — handling API keys, sensitive credentials, and financial data every day. PCI DSS compliance, zero-trust architecture, and key hierarchy management weren't first introduced to me by ByteGuard — they're my day job. That's the lens I built this app with. No team, no funding, no third-party security audit yet (I list this honestly in the "What I built / What I chose not to" section above). What I can offer isn't brand trust, but the architecture itself: - Master password never leaves your device (my server has never seen it) - Secret Key is either device-local (maximum security mode) or end-to-end encrypted via Apple Keychain — even Apple can't read it - My server holds nothing that can decrypt your data If you value "big-company brand + third-party audit" certainty, 1Password and Bitwarden are excellent choices. I respect that choice.
I can't recover it. That's the cost of zero-knowledge: I can't reset what I never knew. Use Face ID / Touch ID for daily unlocking, and write your master password and Secret Key on a piece of paper kept in a safe or a bank deposit box. It sounds 1990s — and it remains the most reliable backup we have.
It depends on whether you enabled iCloud Keychain sync for your Secret Key. If iCloud Keychain sync is enabled (the default-recommended setup): your Secret Key is end-to-end encrypted by Apple and synchronized across all your Apple devices. On a new device, sign in with your Apple ID and your Secret Key restores automatically — you only need to remember your master password. If iCloud Keychain sync is disabled (maximum security, you keep both keys yourself): the Secret Key never leaves the device it was generated on. Your only backup is the 12-word recovery phrase (BIP39 standard) shown when you first created the vault. Write it on paper and store it separately from your master password. Without that paper backup, the Secret Key cannot be restored on a new device. Either way: your master password is still required to decrypt anything — Secret Key alone is not enough. And I have never seen a single bit of either: my server holds nothing that can decrypt your data, and Apple cannot read your Secret Key either (it's E2E encrypted within their Keychain layer).
All sensitive fields are encrypted with AES-256-GCM before they ever leave the device. iCloud receives ciphertext only; even I don't have the key (the key never leaves your device). If you'd rather not use the cloud at all, you can turn sync off in settings — the app falls back to a fully local mode, which is a perfectly legitimate way to use it.
Two reasons. One person can only maintain so much code, and cross-platform means re-implementing crypto primitives correctly on each — get one line wrong and the whole chain breaks. The other: a web app's attack surface (XSS, extension supply-chain, CDN takeover) is far larger than a native iOS app. I'd rather do one platform well than ship something that looks comprehensive but is unevenly secure.
Direct import from 1Password / Bitwarden / LastPass / KeePass / Dashlane / Apple Keychain export files is supported. The whole import runs locally — nothing is uploaded. If your old manager's export format gives you trouble, email me and I'll add support.
$9.99 lifetime is permanent and includes all future updates. If a 'premium subscription' tier is ever added (e.g. deeper security analytics), it'll be subscription-only — existing lifetime features will never be moved behind it. That's a commitment I'm willing to put on this page.