Secure Sync

Secure Authentication

Sign in to sync encrypted memories across devices while keeping your keys on trusted hardware.

What happens next

First, confirm your identity. Device pairing or recovery comes after that. Signing in does not grant decryption access by itself.

✓ sign-in only proves identity

✓ the same browser session can be resumed

✓ vault keys are generated and kept locally

✓ the relay only sees ciphertext and index metadata

Sign in to Membox

Connect your identity to manage device pairing, recovery, and encrypted memory sync.

or use email
Continue with Email

Zero-Knowledge Security

Signing in identifies who you are. Restoring encrypted memories on a new device still requires trusted-device approval or your recovery materials.

Login ≠ Decryption access