Keying sends nothing to anyone, ever.
The long version
Keying is a local-first password manager. Every byte of your vault — passwords, usernames, URLs, notes, TOTP secrets — lives on your Mac in an encrypted file at ~/Library/Application Support/Keying/vault.enc.
The author of Keying (and any party other than you) cannot read your data because:
- The vault is encrypted with AES-256-GCM under a key derived from your master password using PBKDF2 (600,000 iterations, SHA-256).
- The encryption happens entirely on your device, in the Keying app.
- Keying has no server. There is no "Keying account."
What Keying does NOT do
- Keying does not transmit your vault, your master password, your recovery key, or any derived key to any server.
- Keying does not collect analytics, telemetry, or crash reports.
- Keying does not report which sites you visit, log in to, or save passwords for.
- Keying does not include any third-party SDKs, trackers, or advertising networks.
What network access Keying needs
Keying makes network requests in only two situations:
1. Auto-update check.
On startup the app contacts api.github.com and objects.githubusercontent.com to check whether a newer release is available on the public GitHub repository robertocemeri/keying. No identifying information is sent beyond what GitHub records for any public HTTP request (IP address, User-Agent). You can disable updates by blocking outbound traffic to those hosts.
2. Browser extension bridge.
Keying runs a local HTTP server on 127.0.0.1:17321 (your computer's own loopback interface) so the Keying browser extension can request credentials. This server is bound to 127.0.0.1 only — nothing outside your machine can reach it, and every request requires a per-browser token paired interactively.
Keychain access
If you enable Touch ID quick-unlock, Keying stores the vault encryption key in the macOS Keychain under the service name Keying. The key never leaves the Keychain except into Keying's own process memory while the vault is unlocked.
Browser extension
The Keying browser extension stores a single 32-byte random pairing token in chrome.storage.local (or the Firefox equivalent). It contacts only http://127.0.0.1:17321 — your own machine. It does not contact any remote server.
What if I forget my master password?
You use your recovery key, which Keying generates during setup and asks you to print. If you've lost both, the data is unrecoverable — by design.
Changes to this policy
If this policy ever changes substantively, the change will be committed to the public repository and called out in the release notes. There is no email list to be on.
Contact
Open an issue at github.com/robertocemeri/keying/issues.
← Back to Keying