Documentation
Privacy & Permissions
This document explains how VeilVault handles user data and which Android permissions it uses.
VeilVault is a security-first, offline-only password vault developed by CodeVeil.
Privacy in VeilVault is not a feature add-on.
It is a foundational design constraint.
VeilVault operates entirely on the user’s device.
All vault data remains on the device unless the user explicitly exports it.
VeilVault does not require internet access to function.
Any optional interactions with the Play Store (such as license verification) are handled by the platform and are separate from vault data handling.
VeilVault does not collect:
No vault contents, passwords, or derived secrets are ever shared externally.
In exceptional cases (such as startup crash recovery), VeilVault may generate local diagnostic information.
Diagnostics exist solely to help the user understand or resolve local issues.
VeilVault requests only the permissions necessary for its documented functionality.
Permissions are used conservatively and only when required by the platform.
Used when the user explicitly chooses to:
VeilVault uses Android’s Storage Access Framework, which allows users to select specific files or locations without granting broad filesystem access.
Used to provide password autofill and save functionality in supported apps and browsers.
Used only if the user enables biometric unlock.
VeilVault explicitly avoids requesting permissions commonly associated with data collection or tracking, including:
If a permission is not required for local vault operation, it is not requested.
There is no server-side copy to revoke or manage.
VeilVault documents its privacy and permission usage so users can make informed decisions.
If a permission is requested, it is:
VeilVault’s privacy posture is defined by absence of data collection, not by promises of responsible handling.
Privacy is enforced by architecture, not policy.