Your cognition data is yours alone. Vector is built from the ground up to ensure we cannot see, analyze, or access your focus data.
Vector uses a zero-knowledge architecture. This means Vector servers cannot access your focus data, even if we wanted to.
All your cognition data—notes, ratings, outcomes, durations—is encrypted client-side using AES-256-GCM before it ever leaves your browser. The encryption keys never leave your device.
Vector servers can only see:
Vector servers cannot see:
When you first use Vector, a master encryption key is generated in your browser. This key is used to derive sub-keys for different purposes:
Encrypts all your focus training data
Encrypts data for optional cloud sync (future)
Re-encrypts data for export bundles
Keys are stored locally in your browser. You can optionally wrap them with a password for additional security.
If you lose your encryption key, Vector cannot recover your data.
This is by design. The zero-knowledge architecture means Vector never has access to your decryption keys. Make sure to:
If Vector's servers are compromised, attackers cannot read your data. They can only see:
Without your encryption key (stored locally), encrypted data is useless.
All your focus data is stored locally in your browser using IndexedDB. Data is encrypted before storage, so even if someone gains access to your browser's storage, they cannot read your data without your encryption key.
Optional cloud sync (future feature) will store encrypted blobs that the server cannot interpret.
Vector collects minimal analytics to improve the app:
We do not collect scores, ratings, text, durations, or any behavioral data.
An optional research mode (opt-in) may collect aggregated, anonymized counts, but never individual data points or free-form text.
You can export all your data at any time in JSON, CSV, or Markdown formats. Exports are decrypted and include all your focus training history.
You can delete individual sessions, date ranges, or all data. Deletion is permanent and irreversible. Once deleted, Vector cannot recover your data.
This architecture ensures:
No personal data processing without your control
Server cannot access your cognition data
You own and control your data completely
Architecture can be reviewed by security experts