Skip to content

azieltherevealerofthesealed-arch/EmbryoLock

Repository files navigation

EmbryoLock

EmbryoLock is a local file vault that intentionally prioritizes data destruction over recovery after failed authentication attempts.

It is designed for a narrow threat model where:

  • Post-unlock theft
  • Delayed access
  • Casual forensic inspection

are higher risks than accidental data loss.

This project does not attempt to defend against unlimited offline cloning or brute-force attacks. If an attacker can freely duplicate the vault and retry indefinitely, security reduces to the strength of the password and KDF alone.

This tool exists to explore whether catastrophic failure can meaningfully reduce real-world access windows in certain scenarios — not to replace established, audited encryption systems.


Threat Model

In scope

  • Post-unlock device theft
  • Delayed or opportunistic access
  • Casual or non-expert forensic inspection
  • Scenarios where loss is preferable to later compromise

Out of scope

  • Unlimited offline cloning
  • Live malware, keyloggers, or memory inspection
  • Attackers with long-term interactive access
  • Nation-state or forensic-lab adversaries

If an attacker can freely clone the vault and attempt passwords indefinitely, security reduces to the strength of the password/KDF alone.


What This Is

  • A destructive-by-design vault
  • A risk-reduction tool for specific scenarios
  • A learning and exploration project

What This Is Not

  • A replacement for standard encryption tools
  • Protection against determined offline brute-force
  • Safe against user error

Documentation


Warning

This tool can permanently destroy data. Use only if you understand and accept that risk.