Quantum-safe encryption — powered by ML-KEM (FIPS 203)

Your files deserve
unbreakable encryption

Cloud storage that’s actually private. Your files are locked on your device before they ever reach us. Only you hold the key. Not us, not anyone.

Free tier includes 2 GB encrypted storage · View all plans

AES-256Symmetric Encryption
ML-KEMNIST FIPS 203
ZeroKnowledge Architecture

Security first

Encryption that outlasts quantum computers

Every layer of Sefaly is designed around one principle: your data is yours alone.

End-to-End Encrypted

Every file is encrypted with AES-256-GCM in your browser before it ever touches a network. We literally cannot see your data.

Quantum-Safe Keys

File encryption keys are wrapped with ML-KEM (CRYSTALS-Kyber), the NIST post-quantum standard. Safe today and tomorrow.

Password-Derived Key Privacy

Your private key is encrypted with a key derived in the browser from your password. Sign-in uses short-lived proofs instead of replayable login material.

Browser-Native Crypto

Built on the Web Crypto API. No plugins, no extensions, no trust required in third-party binaries. Just open your browser.

How it works

Four steps to total privacy

From your device to our servers, your data is never exposed.

01

Choose your file

Pick any file from your device. It stays local until encryption is complete.

Drag & drop or click to browse
02

Encrypted in-browser

A random 256-bit key is generated. Your file is encrypted with AES-256-GCM right in your browser.

crypto.subtle.encrypt()
03

Key wrapped with ML-KEM

The file key is encapsulated using your ML-KEM public key. Only your private key can recover it.

NIST FIPS 203 compliant
04

Ciphertext uploaded

Only encrypted bytes leave your machine. The server stores ciphertext it can never decrypt.

Zero-knowledge storage

Why quantum-safe?

Today’s encrypted files are tomorrow’s plaintext

Adversaries are harvesting encrypted data today, betting that future quantum computers will crack classical encryption. It’s called “harvest now, decrypt later.”

Sefaly uses ML-KEM (FIPS 203), the NIST-standardized post-quantum key encapsulation mechanism based on module lattices. It’s designed to resist both classical and quantum attacks.

Traditional encryption (RSA, ECDH)

Broken by Shor’s algorithm on a quantum computer

Sefaly’s ML-KEM (lattice-based)

No known quantum or classical attack. NIST standardized.

Cryptographic Stack

File encryptionNIST approved

AES-256-GCM

Authenticated encryption with 256-bit keys

Key encapsulationFIPS 203

ML-KEM-768

Module-Lattice KEM (CRYSTALS-Kyber)

Key derivationNIST SP 800-132

PBKDF2-SHA256

600,000 iterations for password-based keys

Password hashingRFC 9106

Argon2id

Memory-hard hashing, GPU/ASIC resistant

Ready to go quantum-safe?

Create an account in seconds. No credit card. No tracking. Just encryption that’s built to last.

NIST FIPS 203AES-256-GCMArgon2idZero-knowledgeOpen architecture