Skip to content
AppVault

FILE 07 / ENCRYPTED ICLOUD BACKUP

A backup that exists in iCloud but is unreadable, even by Apple.

AppVault’s Encrypted iCloud Backup is an optional, opt-in safety net. When enabled, every file in your vault is sealed on your iPhone with a separate per-device backup key before it touches the iCloud upload pipeline. Apple sees ciphertext. Your second iPhone or iPad re-derives the key from your pattern locally. Nothing decrypts off-device.

UPDATED · 2026-05-16 · REVIEWED BY APPVAULT

Why an opt-in backup at all

A vault without a backup is a vault that vanishes the day you drop your iPhone in a lake. For some users that is the right trade-off — the photos in the vault are sensitive enough that a backup, however well encrypted, introduces an unacceptable surface. For most users, the right trade-off is the opposite: keep the photos, accept that an encrypted backup is structurally safer than no backup, and verify that the encryption is real.

AppVault leaves the choice to you. The default is no backup, no upload, no network call. If you want the safety net, enable Encrypted iCloud Backup in settings — and read the rest of this page to understand exactly what that does.

What encrypted backup is not

Three things are commonly confused with this feature. None of them is what AppVault Encrypted iCloud Backup is.

It is not iCloud Photos. iCloud Photos uploads your camera roll. Files inside AppVault are not in your camera roll, so iCloud Photos never sees them.

It is not Apple Advanced Data Protection. ADP is Apple’s account-wide end-to-end encryption for iCloud, which protects the categories of iCloud data (Photos, Notes, iCloud Drive) that Apple historically held keys for. ADP is a great thing to turn on, and it sits alongside AppVault’s backup rather than replacing it. AppVault’s encrypted backup ships ciphertext that Apple cannot read regardless of whether ADP is enabled on your account.

It is not an AppVault-operated backup service. We do not run a backend. We do not see your files. We do not see whether your backup is running. The "iCloud" in "Encrypted iCloud Backup" is your iCloud, billed to your Apple ID, stored on Apple’s infrastructure. AppVault’s only role is to encrypt the file before iOS hands it to iCloud.

How the encryption works

When you enable backup, AppVault generates a 256-bit backup key on your iPhone using Apple’s CryptoKit framework. The backup key is wrapped by the same Secure Enclave hardware key that wraps your vault key, but the two are independent — encrypting one does not give you the other. The backup key is derived deterministically from your pattern so that a second iPhone or iPad, given the same pattern, can produce the same backup key locally and decrypt the same backups.

Each file inside the vault is then sealed individually with AES-256-GCM, a fresh 96-bit nonce per file, and an authenticated header that records nothing more than the file size and a per-file index. The header itself is encrypted in the same pass. The result is a sequence of opaque blobs that iCloud Drive treats like any other file but which carries no information about your vault that an outside observer could decode.

The catalog — the list of which encrypted blob corresponds to which file inside your vault — is itself encrypted with the backup key as a whole, then split into chunks that look identical in size to the file blobs. From iCloud’s perspective, all the chunks are interchangeable. Apple cannot tell whether your backup contains one photo or one thousand.

Setup and what to expect

Setup is a single toggle in AppVault’s settings. The first time you enable backup, AppVault asks you to confirm by drawing your pattern, derives the backup key, and starts the initial upload. The initial upload runs on Wi-Fi only by default (you can change this), respects iOS background time limits, and resumes automatically when interrupted.

After the initial upload, the backup is incremental. AppVault tracks vault changes — files added, removed, or modified — and queues the encrypted deltas for upload. Most days, this means a few kilobytes of upload activity invisible inside your normal iCloud traffic.

Restoring on a second device

On a second iPhone or iPad signed into the same Apple ID, install AppVault, open the app, draw your pattern, and confirm that you want to restore from iCloud. AppVault re-derives the backup key from your pattern, finds the encrypted blobs in iCloud, downloads them, and decrypts them locally. There is no separate account, no recovery email, no confirmation step that involves an AppVault-operated server. You move from one device to another by drawing the same pattern.

What this does and does not protect against

Encrypted iCloud Backup is protection against device loss, device damage, and the practical inconvenience of starting over. It is not a defense against a forgotten pattern (the pattern is the key in both places), a compelled unlock (you can be ordered to draw the pattern on either device), or a future cryptographic break (which would affect the entire AES-256-GCM ecosystem, not just AppVault).

If you want stronger guarantees than iCloud backup can give, do not enable it. The vault on your device is already as strong as on-device cryptography gets. The backup is for users who are willing to accept that "encrypted upload to a vendor that cannot read it" is preferable to "no copy at all". That is a real choice with two defensible answers.

BACKUP QUESTIONS

Eight questions about an optional safety net.

  1. 01 How is AppVault’s Encrypted iCloud Backup different from regular iCloud Photos?
    Regular iCloud Photos uploads your camera roll to Apple in a form that Apple can decrypt — they hold the keys for any account that has not enabled Apple’s Advanced Data Protection. AppVault’s Encrypted iCloud Backup never gives Apple readable photos. Each file is sealed on your iPhone with a separate per-device backup key before upload. Apple receives only opaque ciphertext that they cannot decrypt and would not know how to interpret.
  2. 02 Is this the same thing as Apple Advanced Data Protection?
    No, these are layered protections that complement each other. Apple Advanced Data Protection (ADP) encrypts your entire iCloud account with a key only your trusted devices hold. AppVault’s Encrypted iCloud Backup goes further by encrypting AppVault files locally before iCloud ever sees them — so even if ADP were compromised or disabled, your vault content stays sealed.
  3. 03 Where is the backup key stored?
    The backup key is generated on your iPhone and bound to the device’s Secure Enclave, exactly like the vault key. When you enable backup on a second device, you authenticate with the same 5×5 pattern you use to unlock the vault — the second device then re-derives a matching key locally. Neither AppVault nor Apple holds the key off-device.
  4. 04 What happens to my backup if I forget my pattern?
    The backup is unreadable without the pattern. The backup ciphertext continues to exist in your iCloud (you can see it as opaque blobs in iCloud storage usage), but no party — including AppVault — can decrypt it. If you have written down the recovery passphrase from setup, that works too. If both are gone, the backup is gone.
  5. 05 How much iCloud storage does the backup use?
    AppVault’s encrypted backup uses roughly the same storage as the unencrypted files would — the AES-GCM overhead per file is 16 bytes plus a 12-byte nonce, which is invisible compared to a 5 MB photo. The backup container itself adds a small catalog header (a few kilobytes). For a typical vault of 500 photos, expect about 2 GB of iCloud usage.
  6. 06 Can I selectively back up some files and not others?
    The backup operates per-vault. You can enable backup on your primary vault and not on your decoy vault, or vice versa, or both. Inside a single vault, all files are backed up — there is no per-file inclusion toggle in version one. That granularity is on the roadmap.
  7. 07 What happens to my iCloud backup if I delete AppVault?
    The backup blobs stay in iCloud until you delete them manually from iCloud Storage settings, or until you reinstall AppVault and disable backup (which prompts you to remove the existing data). They consume space but otherwise do nothing — no one can read them.
  8. 08 Does the backup happen automatically?
    After you enable backup, AppVault watches for vault changes and uploads incrementally in the background, the same way iCloud Photos handles your camera roll. Uploads require Wi-Fi by default; you can switch this to "Wi-Fi and cellular" in settings. Battery and Low Data Mode are respected.

GET STARTED

Seal the vault.

Free to download. The first vault is free, forever. Upgrade only when you outgrow it.