Vaulnox
Client LoginGet Started
AEGIS Confidential Interview

A conversationno one else hears.

An end-to-end encrypted interview that configures SENTINEL to your exact specifications — without Vaulnox ever seeing a single answer.

The Principle

Confidential. End to end.

AEGIS is Vaulnox’s proprietary Confidential Interview System. Through a guided, step-by-step conversation, you define exactly how SENTINEL should operate on your behalf — spending limits, approval thresholds, inheritance triggers, threat protocols, recovery conditions.

The interview is designed around a single principle: Vaulnox never sees your answers.Every response you give, every rule you set, every contact you designate — encrypted on your device and sealed inside the SENTINEL configuration. Not viewable by Vaulnox staff. Not subpoenaable from Vaulnox records. Not recoverable by anyone but you.

If we can’t see your answers, we can’t disclose them — to anyone, under any circumstances.
How it Works

Straight through. End to end.

Your responses travel a dedicated, encrypted path from your device to a quantum-proof server that compiles your SENTINEL configuration. Vaulnox infrastructure is not on the path. Vaulnox operators cannot read, replay, or reconstruct what passes through.

Step 1

Your Device

Answers encrypted locally

Each response is encrypted on your device before it ever leaves. The plaintext never exists outside your phone.

Step 2

The Encrypted Tunnel

No relay. No proxy.

Not a Vaulnox server. Not a CDN cache. A direct cryptographic channel straight through to the configuration server.

Step 3

Quantum-Proof Server

SENTINEL compiled in place

Your answers arrive at a dedicated, quantum-proof encrypted server. SENTINEL compiles your rules inside. The configuration stays sealed — Vaulnox operators cannot open it.

What You Configure

Your rules. Enforced cryptographically.

The interview walks you through every lever SENTINEL can pull. Each choice becomes a cryptographic rule that SENTINEL enforces at the signature layer, 24/7, without manual intervention.

  • Inheritance Protocols— time-locked or condition-based access for heirs and guardians
  • Threat & Litigation Protocols— Total Lockdown or Threshold Approval Mode for duress, divorce, or legal pressure
  • Key Share Restoration— policy-gated recovery using Proactive Secret Sharing for lost devices
  • Trusted Contacts— designate people to verify recoveries, approvals, or medical events
  • Approval Thresholds— spending limits, co-signer requirements, velocity controls
Privacy Guarantees

What we see. What we don’t.

Vaulnox Does Not See
  • The questions you answer
  • The rule values you choose
  • The names of your trusted contacts
  • Your inheritance choices or triggers
  • Your threat and duress protocols
Vaulnox Does See
  • That a configuration exists (not its contents)
  • Transaction metadata required to sign on-chain
  • SENTINEL attestations confirming a rule was applied (not which rule)
Only you and SENTINEL know what SENTINEL is enforcing.
Ongoing

Update anytime. Still private.

Your configuration isn’t a one-time setup. Life changes — marriages, births, new trustees, shifting risk profiles — and AEGIS lets you revisit and revise at any time.

Every update travels the same encrypted tunnel. Every change is enforced by SENTINEL from the moment it’s compiled. And every session leaves the same absence of record: Vaulnox sees that something was updated — never what.

Privacy, by cryptography

Configure in private. Enforce in force.

Get Started

Vaulnox — better than a bank.