Skip to main content

tiCrypt Security Architecture

Traditional security mechanisms, including perimeter defenses, backend network security, and access control management, have proven insufficient against modern threats. The continuous stream of high-profile data breaches makes this clear: when a backend server or admin account is compromised, these mechanisms offer little protection.

tiCrypt takes a fundamentally different approach. Rather than relying on server-side defenses, tiCrypt builds security around strong, user-controlled encryption. Because decryption keys are never stored on the server, a server breach cannot produce a data breach. In tiCrypt, a compromised admin account does not mean compromised data.

Security Principles

tiCrypt is built on three foundational principles: data confinement through encryption, public-key cryptography, and end-to-end encryption. All security features in the platform derive from the combination of these principles.

Data Confinement Through Encryption

Traditional data confinement relies on access control lists (ACLs). The problem with ACLs is that administrators control them, and attackers who compromise an admin account inherit that same power.

tiCrypt enforces data confinement cryptographically. Each file is encrypted at creation with a unique, independently generated AES-256 key. That key is then encrypted with the public keys of authorized users and stored on the server. Encryption occurs on the client before data is transmitted; decryption occurs only on the recipient's client.

File sharing involves no server-side decryption. The process happens entirely in the file owner's browser:

  1. The encrypted file key is retrieved from the server.
  2. The owner decrypts the key using their private key.
  3. The key is re-encrypted with the recipient's public key.
  4. The re-encrypted key is deposited on the server.

The private key never leaves the owner's side. Only public keys are available to other parties.

Public-Key Cryptography

Public-key cryptography uses a key pair: a public key known to everyone, and a private key known only to its owner. Data encrypted with the public key can only be decrypted with the private key, and vice versa. This asymmetry enables both secure data exchange and digital signatures without requiring shared secrets.

tiCrypt uses RSA-2048 key pairs, approved for government use under NIST FIPS 140-3 and recommended by NIST SP 800-57 for key management.

Each user generates a key pair at account creation. This single key pair powers all of tiCrypt's core security functions:

  • Authentication: The user decrypts their private key using their password, signs a server-issued challenge, and the server verifies the signature against the stored public key. No password is ever sent to or stored by the server.
  • File Sharing: Files are shared by encrypting a resource key with the recipient's public key. No passwords or secrets need to change hands.
  • Certificates: Digitally signed instructions authorize other users to perform operations on the owner's behalf.
Technical Deep Dive — RSA-2048: Key Generation and Operations

RSA key pairs are constructed from two secret large primes pp and qq, each approximately 1024 bits. The public modulus is their product:

n=pqn = p \cdot q

Euler's totient of nn is:

ϕ(n)=(p1)(q1)\phi(n) = (p - 1)(q - 1)

A public exponent ee is chosen such that 1<e<ϕ(n)1 < e < \phi(n) and gcd(e,ϕ(n))=1\gcd(e,\, \phi(n)) = 1. tiCrypt uses the standard value e=65537e = 65537 (=216+1= 2^{16} + 1), which is a Fermat prime that makes modular exponentiation efficient while maintaining security. The private exponent dd is the modular multiplicative inverse of ee:

de1(modϕ(n)),i.e.,ed1(modϕ(n))d \equiv e^{-1} \pmod{\phi(n)}, \qquad \text{i.e.,} \quad e \cdot d \equiv 1 \pmod{\phi(n)}

The public key is the pair (n,e)(n,\, e). The private key is dd, kept secret along with pp, qq, and ϕ(n)\phi(n).

Encryption and Decryption

To encrypt a plaintext message mm where 0m<n0 \le m < n:

cme(modn)c \equiv m^e \pmod{n}

To decrypt ciphertext cc:

mcd(modn)m \equiv c^d \pmod{n}

Correctness follows from Euler's theorem. Since ed1(modϕ(n))ed \equiv 1 \pmod{\phi(n)}, there exists an integer kk such that ed=1+kϕ(n)ed = 1 + k\phi(n). Then:

cd(me)dmedm1+kϕ(n)m(mϕ(n))km1km(modn)c^d \equiv (m^e)^d \equiv m^{ed} \equiv m^{1 + k\phi(n)} \equiv m \cdot (m^{\phi(n)})^k \equiv m \cdot 1^k \equiv m \pmod{n}

Digital Signatures and Authentication

Signing reverses the operation: the signer applies their private key to a hash of the message. tiCrypt uses SHA-256 as the hash function HH:

σH(m)d(modn)\sigma \equiv H(m)^d \pmod{n}

Any party with the signer's public key can verify the signature:

H(m)?σe(modn)H(m) \stackrel{?}{\equiv} \sigma^e \pmod{n}

In tiCrypt's authentication protocol, the server issues a random nonce rr. The user computes σH(r)d(modn)\sigma \equiv H(r)^d \pmod{n} and returns σ\sigma. The server checks σeH(r)(modn)\sigma^e \equiv H(r) \pmod{n} against the stored public key. The private key dd is never transmitted; only the signature is.

Security: The Integer Factorization Problem

The security of RSA rests on the hardness of recovering pp and qq from nn. The best known classical algorithm for this is the General Number Field Sieve (GNFS), which runs in sub-exponential time:

TGNFS=exp ⁣((649)1/3(lnn)1/3(lnlnn)2/3)T_{\text{GNFS}} = \exp\!\left(\left(\tfrac{64}{9}\right)^{1/3} (\ln n)^{1/3} (\ln \ln n)^{2/3}\right)

For a 2048-bit modulus, this evaluates to roughly 102310^{23} basic operations — far exceeding the capacity of any foreseeable classical computing system. Even a cluster of 101510^{15} machines each performing 101510^{15} operations per second would require 107\approx 10^7 years to factor a single RSA-2048 modulus.

End-to-End Encryption

End-to-end encryption means data is encrypted as early as possible and decrypted as late as possible, only by the intended recipient and just before use. No intermediate party, including system administrators and the tiCrypt backend, can access the data in transit or at rest.

This is strictly stronger than encryption-in-transit, which allows anyone with access to the right server certificates to decrypt traffic. Even if tiCrypt's TLS certificate were compromised, end-to-end encryption would keep the data secure independently.

Encryption occurs on the client side with keys controlled by the user. If a file is accessed or shared multiple times, it is decrypted each time from scratch. No unencrypted copies persist in intermediate storage.

All data in tiCrypt is encrypted to the same level: AES-256. There are no tiers of security. Since the performance difference between AES-128 and AES-256 is minor (roughly 20%), there is no practical reason to accept weaker protection for any resource.

Technical Deep Dive — AES-256: Block Cipher Construction

AES (Advanced Encryption Standard) is a substitution-permutation network (SPN) block cipher standardized by NIST in FIPS 197. It operates on a fixed 128-bit (16-byte) block of data arranged as a 4×44 \times 4 byte matrix called the state. AES-256 uses a 256-bit key and applies 14 rounds of transformation. All arithmetic is performed in the finite field F28=F2[x]/(x8+x4+x3+x+1)\mathbb{F}_{2^8} = \mathbb{F}_2[x]\,/\,(x^8 + x^4 + x^3 + x + 1), where each byte represents a degree-7 polynomial over F2\mathbb{F}_2.

State Representation

The 16 input bytes are loaded into the state matrix SS as columns, giving elements sr,cs_{r,c} for row r{0,1,2,3}r \in \{0,1,2,3\} and column c{0,1,2,3}c \in \{0,1,2,3\}. Each element is a byte — an element of F28\mathbb{F}_{2^8}.

Round Structure

Each round (except the last) applies four operations in sequence:

1. SubBytes — Non-linear substitution

Each byte bb in the state is replaced by a value from the AES S-box. The S-box is constructed from two steps in F28\mathbb{F}_{2^8}:

  • Compute the multiplicative inverse: bb1b \mapsto b^{-1} (with 01=00^{-1} = 0 by convention)
  • Apply the affine transformation over F28\mathbb{F}_2^8:

S(b)=Ab10x63S(b) = A \cdot b^{-1} \oplus \texttt{0x63}

where AA is the fixed 8×88 \times 8 binary circulant matrix defined in the AES specification. The non-linearity of the modular inversion step is what makes the cipher resistant to algebraic and linear attacks.

2. ShiftRows — Inter-column diffusion

Row rr of the state is cyclically shifted left by rr byte positions:

sr,csr,(c+r)mod4s_{r,c} \leftarrow s_{r,\,(c + r) \bmod 4}

Row 0 is unchanged; rows 1, 2, and 3 shift left by 1, 2, and 3 positions respectively. This ensures that after two rounds, every column of the state contains bytes that originated from all four columns of the input.

3. MixColumns — Linear mixing within columns

Each column [s0,c,s1,c,s2,c,s3,c]T[s_{0,c},\, s_{1,c},\, s_{2,c},\, s_{3,c}]^T is multiplied by a fixed 4×44 \times 4 MDS matrix over F28\mathbb{F}_{2^8}:

(s0,cs1,cs2,cs3,c)=(02030101010203010101020303010102)(s0,cs1,cs2,cs3,c)\begin{pmatrix} s'_{0,c} \\ s'_{1,c} \\ s'_{2,c} \\ s'_{3,c} \end{pmatrix} = \begin{pmatrix} 02 & 03 & 01 & 01 \\ 01 & 02 & 03 & 01 \\ 01 & 01 & 02 & 03 \\ 03 & 01 & 01 & 02 \end{pmatrix} \begin{pmatrix} s_{0,c} \\ s_{1,c} \\ s_{2,c} \\ s_{3,c} \end{pmatrix}

Coefficients are elements of F28\mathbb{F}_{2^8}: 02\texttt{02} denotes multiplication by xx (a left shift with conditional XOR of 0x1B\texttt{0x1B}), and 03\texttt{03} denotes multiplication by x+1x + 1. This matrix is an MDS (Maximum Distance Separable) matrix, which guarantees that any non-zero difference in a column input produces differences in all four output bytes — the strict avalanche criterion. Combined with ShiftRows, after just two rounds every output byte depends on every input byte.

4. AddRoundKey — Key injection

Each byte of the state is XORed with the corresponding byte of the round key K(r)K^{(r)} derived from the key schedule:

sr,csr,ckr,c(r)s_{r,c} \leftarrow s_{r,c} \oplus k^{(r)}_{r,c}

The final round applies SubBytes, ShiftRows, and AddRoundKey only — MixColumns is omitted to make encryption and decryption structurally symmetric.

Key Schedule

The 256-bit master key is expanded into 15 round keys (one for the initial key addition plus one per round) using the Rijndael key schedule. The schedule generates successive 32-bit words by applying SubBytes, a byte rotation, and XOR with round constants Rcon[i]=xi1F28\text{Rcon}[i] = x^{i-1} \in \mathbb{F}_{2^8}. For AES-256, an additional SubBytes application is inserted every other word to prevent the symmetry that could arise from the larger key size.

Security

AES-256 provides a key space of 22561.16×10772^{256} \approx 1.16 \times 10^{77} possible keys. At 101810^{18} guesses per second — well beyond any present hardware — exhaustive search would require approximately 3.67×10503.67 \times 10^{50} years. The best published cryptanalytic attack (biclique, 2011) achieves a complexity of 2254.42^{254.4}, an entirely negligible practical improvement. The SPN construction provably bounds the probability that any non-trivial differential or linear trail through four rounds is at most 21282^{-128}, giving AES its formal resistance to both differential and linear cryptanalysis.

Combined Security Model

Each file in tiCrypt is protected under a hybrid scheme: AES-256 encrypts the file data using a randomly generated per-file key, while RSA-2048 encrypts that key under each authorized user's public key. An attacker must break at least one of two independent hardness problems — the integer factorization problem to recover the file key from its RSA-encrypted form, or the AES construction to recover plaintext without it. No known attack achieves either at the key lengths tiCrypt uses. Because the two problems are mathematically independent, progress against one provides no leverage against the other.

Attack Scenarios and Mitigations

Server Misconfiguration

Threat

A misconfigured or improperly rebooted server can disable authentication, leaving the system open.

Mitigation

In tiCrypt, a fully disabled authentication server still exposes nothing useful. The accessible data is encrypted with keys held only by individual users. No scenario allows tiCrypt to leak unencrypted data, present or future.

Insider Threats

Threat

Admins with broad data access can exfiltrate information before detection. Traditional audit logs are too slow and voluminous to serve as an effective deterrent.

Mitigation

tiCrypt cryptographically isolates administrators from user data. All legitimate access flows through the tiCrypt system and is captured in the audit log. Log mining can surface irregularities within minutes. Rogue admin activity is structurally visible in a way it is not in traditional systems.

Authentication Attacks

Threat

If an attacker can forge authentication certificates or substitute public keys, they can impersonate users and access shared files.

Mitigation

tiCrypt's chain of trust and crowd security (detailed in the next section) make key substitution detectable. Public key fingerprints are stored client-side, outside server control. Any attempt to swap a key will be caught by any client that has previously interacted with that user. The trust chain can be independently validated by any user without relying on the server.

Zero-Day Exploits

Threat

If zero-day exploits are discovered in backend servers, attackers can access stored data. High-value data stores make such attacks financially motivated.

Mitigation

tiCrypt's end-to-end encryption renders backend access useless. Decryption keys are never present on the server. A full server compromise makes the system temporarily unavailable, not insecure. Encrypted data remains protected regardless of how long an attacker controls the backend.

Advanced Security Features

Public Key Signing and Chain of Trust

Public-key cryptography introduces one notable vulnerability: an attacker with server access could substitute a user's public key with one they control, then intercept future file shares encrypted to that fake key.

tiCrypt mitigates this through a chain of digital signatures:

  • A site key, signed by a hardwired Tera Insights private key, bootstraps the security of the entire deployment.
  • The site key signs the first super-admin key; that key signs subsequent admin keys; and so on.
  • Every new user account is approved by an administrator, whose private key signs the new account's public key, cryptographically linking it to the chain of trust.
  • Any user can independently verify the full chain of signatures on the client side, without trusting the server.

An attacker cannot inject a fake key without controlling an administrator key.

Crowd Security

To further protect key integrity, tiCrypt's frontend locally stores SHA-256 fingerprints of every public key it has previously interacted with. When a file is shared with a user, the frontend fetches the user's public key and compares it against the stored fingerprint. Any discrepancy is immediately flagged.

This fingerprint data is stored client-side, outside the server's reach. Even with a fully compromised server, an attacker cannot swap keys without detection by any client that has previously interacted with the target user.

Secure JavaScript Delivery

Since tiCrypt's frontend runs in the browser, a natural attack vector is injecting malicious JavaScript to steal private keys. tiCrypt addresses this in three ways:

  1. All dependencies are bundled into the tiCrypt frontend. No external JavaScript, CSS, or HTML resources are referenced. Compromised third-party libraries cannot affect a packaged tiCrypt deployment.
  2. The frontend bundle is delivered as a digitally signed ZIP archive, with signing keys controlled by two senior Tera Insights executives.
  3. tiCrypt Connect serves the frontend locally, automatically updates it on new releases, and works alongside the frontend to authenticate all VM traffic, locking sessions if unauthenticated connections are detected.

Key Escrow

Loss of a private key means loss of data access. tiCrypt's key escrow mechanism enables recovery without creating a single point of failure.

Recovery requires a minimum of three escrow keys, each signed by the site key and usable only for escrow activities. The recovery process works as follows:

  1. A random AES-256 key share is generated for each escrow key holder and encrypted with that holder's escrow public key.
  2. The user's private key is encrypted with a composite key derived from all individual shares, then stored on the server.

No individual escrow key holder can recover the user's private key alone. All shares must be combined by a designated recovery party. If any share is missing, recovery is impossible.

Secure Virtual Machines

tiCrypt provides secure computation environments through encrypted virtual machines (VMs) with a fundamentally different access model from conventional cloud infrastructure.

Access Model

VMs cannot be accessed through console connections, direct SSH logins, or standard remote access tools, all of which could be exploited by a compromised admin. The only access path is through a secure, user-authenticated channel within tiCrypt:

  1. When a VM starts, it receives the owner's public key.
  2. The user and VM co-authenticate using their respective public and private keys.
  3. A symmetric session key is negotiated via Diffie-Hellman and used for all subsequent communication.

The result is a double-encrypted channel: data is encrypted with the session key at the application layer and transmitted over an encrypted WebSocket transport. The backend is involved only in the initial handshake and never participates in ongoing communication between the user and their VM.

Encrypted Drives

VMs use encrypted drives whose keys are generated and managed identically to file keys. The user-VM channel transmits drive keys at startup; even system administrators cannot access drive contents.

Data Store Access

VMs access the main data store through secure sub-sessions, with file keys passed through the encrypted user-VM channel.

Secure Tunnels

tiCrypt Connect establishes a TLS tunnel using FIPS-approved cipher suites between the user's computer and the VM, with exclusively public-key authentication and ephemeral private keys. No commands can be run on the remote machine through this protocol. It is more restrictive than SSH by design.

Outbound Access

VMs have strictly limited internet access. Only the tiCrypt backend and licensing servers are reachable. This prevents both accidental and intentional data exfiltration. Even a hijacked VM can only route data through the audited tiCrypt vault.

Boot Images

VM boot images are immutable and reset automatically on each boot, eliminating persistent internal risk.

Combining tiCrypt with Traditional Defenses

tiCrypt's encryption-first architecture is designed to complement, not replace, traditional security measures. An attacker must defeat both to achieve a breach.

Multi-Factor Authentication

tiCrypt's primary authentication mechanism, private-key signing, is strong on its own. However, a stolen private key used from an unfamiliar machine represents a real risk. MFA addresses this as an independent, additional layer.

Rather than integrating MFA into the backend (which would create a single point of failure), tiCrypt treats MFA providers as external proof-providers. When a key is used from a machine inactive for a set period or never previously used by that user, tiCrypt's authentication protocol requires MFA to independently verify the request. A stolen key used from a new machine will trigger this check and be denied.

Perimeter and Server Defense

tiCrypt's deployment minimizes server-side attack surface by design:

  • Regular user accounts are not required on the hosting server, eliminating most server-side vulnerabilities at the source.
  • Only two entry points are needed: SSH for admin management and HTTPS for the tiCrypt interface. All other ports should be blocked.
  • Strong SSH public-key authentication can be deployed for all administrative access, rendering password-based attacks ineffective.
  • All existing security tools, including firewalls, intrusion detection, and system auditing, are fully compatible with tiCrypt and add meaningful additional layers.

Auditing and Compliance

tiCrypt is built to meet NIST and CMMC compliance requirements. Its audit engine can process hundreds of millions of entries per second, making large-scale log analysis practical.

Secure Audit Logs

Log entries are chained using SHA-256 hashing. Any modification to a log entry produces a hash conflict detectable upon audit. Administrators and attackers alike cannot alter the log history without leaving forensic evidence.

Audited Events

tiCrypt tracks 30+ event types at millisecond precision, including:

CategoryEvents
Sessions & AuthenticationCertificate requests, challenges, lookups, and deletions
File SystemDirectory creation, deletion, renaming, and modification
Virtual MachinesCreation, deletion, and proxy registration
Virtual DrivesAttachment, detachment, creation, deletion, and key operations
FilesCreation, deletion, key operations, and chunk-level read/write events
Access ControlGroup and user permission creation, deletion, and modification

Infrastructure and Scalability

System Architecture

tiCrypt's backend is composed of ten loosely coupled services, each with its own MongoDB database and configuration. Services communicate exclusively over TCP and have no shared state. A failure or compromise of one service does not grant access to the data or keys held by any other.

ServiceRole
ticrypt-restHTTPS entry point for all client requests; reverse-proxied behind Nginx
ticrypt-authAuthentication, authorization, and global coordination across all services
ticrypt-file-managerFile and directory management
ticrypt-storageEncrypted chunk storage
ticrypt-vmVirtual machine lifecycle and SLURM batch integration
ticrypt-proxySecure tunnel mediation between users and VMs
ticrypt-loggerTamper-resistant, append-only audit log
ticrypt-statsStatistical data collection
ticrypt-notificationsUser and system notifications
ticrypt-maintenanceBackground maintenance tasks

All client requests enter through ticrypt-rest and are validated by ticrypt-auth before any service acts on them. No service is reachable directly from outside the backend.

Audit System Isolation

tiCrypt Audit is a dedicated, separately deployed system for log processing, alerting, and ad hoc queries. The backend pushes log data to Audit over a one-way TCP connection on port 25000. There is no return path — Audit cannot issue commands to or query the backend. This means security and compliance teams can be granted access to Audit without receiving any access to the tiCrypt backend, its data, or its user keys. The audit record cannot be altered by anyone with access to the tiCrypt backend; doing so would produce a detectable hash conflict in the chained log.

Data Ingress Boundary

The data ingress services — ticrypt-sftp and ticrypt-mailbox — are intentionally deployed outside the secure infrastructure perimeter. External collaborators can deposit data into the enclave without being granted any access to the backend, the Vault, or user accounts. Files deposited through either channel are encrypted on arrival using the recipient's public key. The ingress services require only a one-way network path to ticrypt-rest; the backend has no network path back to them.

VM Network Isolation

VMs do not accept direct connections. All ports are blocked at the host firewall and internally within the VM except port 22, which is not running SSH — it is controlled exclusively by the VM controller (ticrypt-vmc) for encrypted tunnel traffic. All VM communication is mediated by ticrypt-proxy over mutually authenticated WebSocket connections with Diffie-Hellman key negotiation. No component between the user and the VM, including ticrypt-proxy itself, can read the session traffic after the initial handshake.

Outbound traffic from VMs is fully blocked by default. The only permitted exception is access to licensing servers configured explicitly through ticrypt-allowedlist, which requires SuperAdmin authorization and operates by manipulating firewall rules and DNS replies on the backend host — not within the VM itself.

Storage

Vault Storage

Vault file content is divided into 8 MB chunks, each encrypted independently using the file's AES-256 key. Each chunk is stored as 8 MB + 64 bytes on disk; the extra 64 bytes hold the initialization vector (IV) for AES encryption. Chunks are numbered from zero and stored in a directory structure keyed to the file ID, accessible only to the tiCrypt backend — not to VM hosts or any other service.

All metadata — file properties, directory entries, access information, and per-file decryption keys — is stored in MongoDB, separated from the chunk data. An attacker with access to the raw chunk files has no path to plaintext without the decryption keys, which only authorized users can recover.

A practical consequence of this design is that Vault chunks can be backed up using any method, including unencrypted backups or cloud storage, without creating a compliance risk. The encryption is inherent to the data, not to the storage medium. tiCrypt places no requirement on the underlying filesystem for Vault storage, but access to the storage directory should be restricted to the tiCrypt backend.

Encrypted VM Drives

VM encrypted drives are stored as files in a distributed filesystem accessible to all Libvirt host servers, organized into disk pools (separate pools for disk images, encrypted drives, and ISOs). A newly created drive is intentionally left blank and unformatted. Formatting is deferred until the drive's first attachment to a tiCrypt VM for a critical security reason: the encryption key is generated and held by the user and the VM controller, not by the infrastructure. The tiCrypt backend, Libvirt, and the underlying VM host are all excluded from this key.

On Windows, the drive is formatted as NTFS and BitLocker full-volume encryption is enabled immediately — before the drive is made available to the user. All subsequent writes, including filesystem metadata, are encrypted. An external tool inspecting the backing file can determine the drive is NTFS-formatted but can read no content beyond what was written before BitLocker was activated, which is minimal.

On Linux, LUKS encryption is applied at the block layer, beneath the filesystem (typically EXT4). This means all data written to the drive — including filesystem structure, metadata, and file content — is encrypted. An external tool inspecting the backing file can only determine which disk blocks have been written; it cannot derive any information about their content or the filesystem type.

Non-Secure Storage: ISOs and NFS

ISOs are attached as read-only CD-ROM devices and are always safe to mount in a tiCrypt VM. They are useful for distributing software packages and public datasets without introducing a writable external channel.

NFS shares require careful handling. An NFS share mounted read-write inside a secure VM creates a direct data exfiltration path that bypasses tiCrypt's encryption and audit controls entirely — this renders the deployment non-compliant. All NFS shares mounted in tiCrypt VMs must be exported read-only.

The NFS server itself must also fall within the tiCrypt security envelope. An NFS server outside the controlled infrastructure extends the security boundary to a system that may not meet tiCrypt's requirements. The recommended approach is to run a local NFS server inside the envelope and replicate data into it from external sources, so VMs access only the controlled copy.

Data Migration

tiCrypt supports several secure methods for importing data:

  • Browser upload: Direct upload of smaller files into the user's Vault via the tiCrypt web interface.
  • SFTP / Inbox credentials: External parties can send files directly to a user's Vault. Files are encrypted using the recipient's public key on arrival, so only the intended user can decrypt them. The SFTP/Inbox server can be hosted separately from the tiCrypt backend.
  • VM SFTP via tiCrypt Connect: With tiCrypt Connect running, users can generate SFTP credentials to transfer data directly into a VM. Proxy connections are managed by the application.
  • External Drive Builder: The Drive Builder tool allows users to create and encrypt virtual drives externally, sign them with their public key, and copy them into the tiCrypt drive pool.
  • External cloud services: Dropbox, Google Cloud, and OneDrive integrations allow one-way, secure data transfer into a user's Vault.

All import methods maintain end-to-end encryption throughout the transfer process.

Conclusion

The prevailing model of data security assumes that if the walls are strong enough, the data inside is safe. tiCrypt rejects this assumption. Walls can be breached. Admins can be compromised. Authentication servers can be spoofed. The question is not whether an attacker can reach the server, but what they find when they do.

tiCrypt's answer is: nothing usable. By grounding every security guarantee in user-controlled, end-to-end encryption and RSA-2048 public-key cryptography, tiCrypt ensures that a breach of the server is a breach of infrastructure and not a breach of data. Decryption keys never reside on the server. Passwords are never transmitted or stored. Administrators are cryptographically isolated from user data. Every file, drive, and communication channel is independently encrypted, and access to one reveals nothing about any other.

Layered on top of this foundation are the mechanisms that address sophisticated, targeted attacks: a chain of trust that makes key substitution detectable, crowd security that catches irregularities client-side, MFA integration that treats identity providers as independent proof-providers rather than trusted insiders, and tamper-evident audit logs that make rogue activity visible within minutes.

The result is a system where the attack surface is dramatically reduced, the value of a successful breach is radically diminished, and the burden of proof falls entirely on cryptography. It is the one mechanism that neither insider threats, zero-day exploits, nor compromised infrastructure can quietly bypass.

tiCrypt is not a harder wall. It is a fundamentally different approach to what security means.