security fundamentals
The architecture is the promise.
Peach doesn't ask you to trust a company. The security claims are enforced by the code running on your machine.
Peach is built on TypeScript and SolidJS.
KEY DERIVATION Argon2id | 64MB memory | 3 iterations | OWASP 2025
ENCRYPTION AES-256-GCM | authenticated | fresh nonce per write
INTEGRITY BLAKE3 | 256-bit digest | length-extension resistant
PAIRING Chirp | ultrasonic audio | Noise NK | ephemeral X25519
SYNC TRANSPORT Noise XX | X25519 | ChaCha20-Poly1305 | forward secrecy
BACKUP FORMAT PeachScript | printable code | zstd compressed | copy or scan
LICENSE VALIDATION Ed25519 signature | offline | no server required
We designed Peach so that even we cannot read your passwords.
No product telemetry.
The only outbound connections are opt-in breach monitoring and an opt-in bug reporting system. Bug reports record only device type — for example, iPhone 15 or MacBook Air M2. No user IDs, no IP addresses, no account required.
No account.
Peach never asks for your email, your name, or any identifying information to use the product. There is no user database. There are no users—only installations.
Payments stay with the processor.
Checkout is handled by Polar. Licenses are generated after payment and sent to your email within seconds. Purchaser information is not passed into Peach product infrastructure.
No infrastructure to breach.
There is no Peach backend, no hosted vault service, no account system, and no customer database. When Peach is “breached,” there is no central vault trove or user table to steal.
Export anytime. To anywhere.
Your vault is yours. Export as a standard CSV to move to any password manager, as PeachScript to restore into Peach on another device, or as a Peach Codex to keep a physical backup in a safe. No lock-in. No export fee.
No kill switch.
Your license works offline forever. If Peach development stopped tomorrow, your installed copy would keep working indefinitely. No phone-home, no expiration.