When device access becomes the threat
Travel creates risks that ordinary encryption does not fully address: inspection, coercion, loss, theft, and delayed discovery.
Border and checkpoint inspection
Keep the smallest possible set of travel-sensitive files on device, with decoy access available when configured.
Coerced unlock scenarios
Use duress mode when showing a normal-looking decoy vault is safer than exposing real files.
Lost or seized phone
Set file timers and check-in windows to reduce how long sensitive material remains available.
Sensitive field work
Capture notes, photos, and recordings directly into the vault instead of leaving them in default apps.
Controls for travel-sensitive files
Local Secure Enclave-backed vault
Store files on iPhone with non-extractable hardware-backed keys and no UltraLocked account recovery path.
Duress and decoy access
Configure a secondary PIN that opens a decoy vault while protecting the real vault under pressure.
Self-destruct timers
Assign time-to-live windows to files so sensitive material does not remain available indefinitely.
Dead man's switch
Require periodic check-ins and wipe the vault if the configured window is missed.
Before you travel
UltraLocked is most effective when you decide what should and should not be on the device before entering a higher-risk environment.
- Move only the files you need for the trip into the vault.
- Configure timers, duress behavior, and check-in windows before departure.
- Keep legally required records and long-term archives in separate approved systems.
Destructive travel controls can be permanent. Configure them only when the security tradeoff fits your situation and legal obligations.
Prepare your travel vault
Download UltraLocked on the App Store. 7-day free trial.