A local and secure workspace for documents, media and private files

Control private files with more clarity in one place

B Safe brings layered vault structure, metadata sanitization, Touch ID access and controlled preview into one clean desktop experience.

Encrypted storage Hidden section support Local-first flow
  • Contracts, financial records and private assets can live inside one protected workspace.
  • Highly sensitive material can stay separated with hidden section and keyfile support.
  • Media files can be prepared for safer sharing with metadata sanitization.
B Safe Interface

Fast, calm and confidence-building desktop experience

Classify files, protect them and access them in a more controlled way when needed.

Encrypted vault Touch ID access Safer sharing
Home screen Preparation area and quick vault creation
B Safe home screen and quick vault creation
Security wizard Password, keyfile and guided setup
B Safe security wizard screen
Controlled preview View content after opening the vault
B Safe controlled preview screen
Features

Core features that differentiate B Safe

Each layer is designed to help manage sensitive files with more security, structure and control.

01

Layered vault model

Build a flexible protection strategy around a main password, hidden section and keyfile support.

02

Hidden section and controlled visibility

Different content layers can be opened with different passwords so highly sensitive material stays separated from the standard view.

03

Touch ID and auto-lock

The app integrates with macOS authentication flows while keeping protection active when it moves into the background.

04

Metadata sanitization

Image metadata such as EXIF, GPS and related fields can be removed to reduce accidental exposure.

05

Controlled preview

Open text, PDF and image files inside the app to reduce unnecessary exports and scattered temporary files.

06

Guided packaging

Compression level, expiration date, carrier image and notes help shape the vault around real operating needs.

Flow

More organized and more controlled protection in three steps

B Safe turns technical security choices into clear product steps so teams can focus on decisions instead of complex commands.

1

Stage your files

Use drag and drop to separate main files, hidden content and notes before packaging.

2

Choose your security rules

Set password, keyfile, Touch ID, metadata sanitization and expiration options from one guided wizard.

3

Open, preview and manage

Access locked content in a controlled way, preview it, export if needed or seal it again.

Architecture

The confidence comes from more than the surface

Behind the modern interface, B Safe runs with strong encryption, integrity checks and controlled preview layers.

Encryption AES-GCM based archive sealing
Key derivation PBKDF2-hardened password flow
Integrity HMAC verification for tamper detection
Preview Controlled RAM-based preview with limits
Hygiene Metadata sanitization and safer temp-data handling
Defenses Suspicious path, malformed content and extraction-limit protections
Comparison

Why does B Safe feel more complete as a desktop security product?

The codebase combines layered vault logic, AES-GCM sealing, PBKDF2 hardening with 1,200,000 iterations, integrity verification, metadata sanitization and controlled preview. That makes B Safe feel like more than storage: it feels guided and operationally ready.

Criteria B Safe VeraCrypt Cryptomator Keka / BetterZip
Cryptographic foundation AES-GCM sealing, PBKDF2 hardening and integrity verification in one guided flow Strong encryption, but the workflow is more technical Strong vault model, with a stronger cloud-folder focus Mostly centered on archive handling and password protection
Layered access model Main vault, hidden section, keyfile and Touch ID can work together Strong container logic, but more manual in practice Standard vault model without hidden-section behavior Convenient archives rather than layered protection
Preview and access flow Code-level controlled preview and single-panel management Often requires mounting and external handling Good for cloud vault scenarios, less operational on desktop Good archive browsing, lighter secure-preview story
Operational safeguards Metadata sanitization, expiry controls, suspicious-path checks and extraction limits Often depends on extra tools and user discipline Scenario-dependent privacy considerations remain Operational privacy is not the main product focus
Product feel Technical depth with a calm UI, making security choices faster and clearer Closer to power users Clear in its niche Practical, but less like a premium security product

This comparison is simplified from the app code paths covering crypto flow, hidden section handling, keyfile support, controlled preview and safety checks.

Licensing

Two plans, clear decision

Try the core workflow first, then move to stronger security layers with Pro.

Starter

Basic

For users who want to try the app and use the core vault workflow.

Free

A clean local-first entry point for collecting and organizing sensitive files more safely.

  • Core encrypted vault creation
  • Local workflow
  • Standard file organization
  • Basic preview and archive management
1 macOS device Core usage Free start
Start free
Both plans keep the workflow local and focused.

Pro unlocks the layers visible in the codebase: hidden section, keyfile, Touch ID, auto-lock, metadata sanitization and controlled preview.

B Safe

Bring more order and control to sensitive files

Keep setup simple, raise the protection level and move to a more controlled workflow without changing your local habits.

FAQ

Frequently asked questions

What is B Safe suitable for?

It fits contracts, financial documents, private media archives, internal notes and any sensitive files that need tighter control.

What does Pro unlock?

Pro unlocks hidden section support, keyfile flow, Touch ID access, auto-lock, metadata sanitization and more controlled preview.

Are files sent to the cloud?

The product is positioned around a local-first model. In the default flow, files are managed on the device.

Contact

Reach out for questions and licensing

Send a message if you want details about the product, pricing or team usage.

Response time Usually within 1 business day

Form submissions now land in the secure admin inbox with basic security checks and minimal data collection.