⬤ CLASSIFIED INFRASTRUCTURE Alethon Privacy Solutions

Two passwords.
Two realities.

ColdNotes is an encrypted notebook with a duress vault — enter your real password and see your real notes. Enter a different password and an entirely separate vault opens. Your real notes remain encrypted and invisible.

Built on AES-256-GCM, Argon2id key derivation, and a 16-word BIP-39 recovery phrase — the same cryptographic standard used by Bitcoin wallets.

AES-256
Encryption standard
16 words
BIP-39 recovery phrase
2 vaults
Real + duress decoy
0 servers
Local-first, your device only
The Feature No One Else Has

The Duress Vault

If you are ever forced to unlock your notes, you don't have to reveal anything real. ColdNotes has two completely independent, encrypted vaults inside a single file.

coldnotes — vault.cn
01
Under pressure?
Someone demands your password. No right to refuse. Legal, physical, or social pressure — it happens.
02
Enter your duress password
A completely independent decoy vault opens. It looks exactly like your real app. You can even populate it with convincing fake notes.
03
Real notes stay invisible
Your actual data remains encrypted under a separate master key. There is no technical way to prove a second vault exists — it is cryptographically indistinguishable.
Full Feature Set

Built for the Paranoid.
Usable by Everyone.

Every feature exists because a real threat model demanded it.

SIGNATURE FEATURE

Duress Vault

A second master key wraps a completely independent decoy vault. Real notes and decoy notes coexist in one file — cryptographically indistinguishable. No way to prove the real vault exists.

ENCRYPTION

AES-256-GCM

Per-write 12-byte random nonce. Argon2id key derivation (64 MiB memory cost). The same cipher protecting classified government communications. Wrong password? The vault returns nothing — not even an error trace.

RECOVERY

16-Word BIP-39 Seed

168 bits of entropy encoded as 16 English words. The same standard used to secure Bitcoin and Ethereum wallets. Forget your password — your seed phrase restores everything.

INTEGRITY

SHA-256 Hash Chain

Every entry is chained to the previous via SHA-256. Any modification to any entry — even a single byte — breaks the chain and triggers an alert. No silent tampering.

VERIFICATION

Tamper Detection

Chain head anchored to a remote server. Even if someone deletes entries from the tail, truncation attacks are detected by comparing local chain state against the remote anchor.

STEALTH

Timestomping & Stealth Path

The vault file is stored at a mundane system path and its timestamps are cloned from OS files. To a casual observer — or basic forensic scan — it looks like a system log.

BACKUP

Rolling Encrypted Backups

Every save rotates the previous vault to a backup file. Up to 5 encrypted backups kept. All readable only with your password — never plaintext, never exposed.

ORGANISATION

Hierarchical Note Paths

Organise notes by path: Work/credentials/server, Legal/contracts/2024. Arbitrary depth. A folder tree inside a single encrypted file.

SOVEREIGNTY

100% Local-First

No account. No cloud sync. No telemetry. One portable file on your device. Take it anywhere. ColdNotes never phones home — because there is no home to phone.

Architecture

How Your Data Is Protected

Every write goes through five layers before touching disk.

01

You type a note

Plaintext exists only in memory. It is never written to disk unencrypted. If you crash mid-write, no sensitive data is recoverable from disk.

02

Argon2id derives the key

Your password is run through Argon2id — 3 passes, 64 MiB memory, 4 threads. Brute-force becomes computationally infeasible. A GPU farm cannot crack a strong password.

argon2id(password, salt, t=3, m=65536, p=4) → 32-byte key
03

AES-256-GCM encrypts the vault

All notes are encrypted together as one sealed blob. A fresh random 12-byte nonce is generated on every write — no two ciphertexts are alike even for identical content. GCM mode also provides authenticated encryption: any bit flip is detected before decryption.

04

Duress key wraps a second vault

If you have a duress password configured, a separate master key wraps a completely independent note set. Both vaults are stored in the same file. There is no flag, no metadata, no field that says "a second vault exists."

05

Timestomped and written to stealth path

The vault file's modification and access timestamps are cloned from a system file. The storage path defaults to a location that looks like a system cache. Automated scans typically ignore it entirely.

Threat Model

What ColdNotes
Protects Against

Device theft or seizure

AES-256-GCM with Argon2id makes offline cracking computationally infeasible. The vault is useless without your password or recovery phrase.

Coerced access

The duress vault provides plausible deniability. You can comply with a demand to unlock your notes without revealing your real data.

File tampering

GCM authentication detects any byte-level modification. SHA-256 hash chain catches edit or deletion of entries. Both layers must be bypassed — simultaneously.

Data loss

Five rolling encrypted backups rotate automatically. 16-word BIP-39 recovery phrase provides a cryptographically secure master fallback.

Passive surveillance

Stealth storage path and timestomping make the vault file blend in with system files. No obvious file extension. No metadata leakage.

Vendor compromise

No servers, no accounts, no sync infrastructure to compromise. The attack surface is your local device and your memory. Nothing else.

Honest Limitations

× Secure delete is best-effort on APFS/btrfs (copy-on-write filesystems)
× File ctime (creation time) cannot be masked from root-level observers
× No protection against keyloggers or memory scrapers at the OS level
× Security of your recovery phrase depends on where you write it down
Use Cases

Who Needs This

⚖️

Legal Professionals

Client notes, case strategy, and privileged communications that must remain beyond reach.

📰

Journalists

Source protection and investigation notes in environments where device access can be compelled.

🔐

Security Researchers

Credentials, vulnerability notes, and proof-of-concept details that cannot leak before disclosure.

🧠

Private Individuals

Anyone who writes things down that are no one else's business. Your thoughts are yours.

Pricing

Own it. Permanently.

One purchase. No subscriptions. No accounts. No servers. Yours forever.

Personal
$29
One-time · Single machine
  • AES-256-GCM military-grade encryption
  • 16-word recovery key
  • Hidden duress vault
  • Tamper-evident chain
  • Encrypted auto-backups
  • macOS & Windows
  • All future updates included
Purchase Personal →
MOST POPULAR
Professional
$79
One-time · Up to 3 machines
  • Everything in Personal
  • License for up to 3 machines
  • Priority email support
  • License transfer on request
Purchase Professional →

After purchase, you'll receive a download link and license key within 24 hours.
Questions? admin@alethongroup.com

Get Started

Your thoughts are yours.
We built the proof.

Questions, volume licensing, or custom requirements? Reach us directly.

Contact Us →