← Back to blog
·4 min read

Are Photo Vault Apps Actually Safe? We Checked.

A look at the privacy practices of Keepsafe, Private Photo Vault, and HiddenVault. Most can see your photos — and say so in their privacy policies.

SecurityVault AppsKeepsafe
TL;DR

You download a photo vault because you want privacy. Except most of these apps can see your photos. Some of them literally tell you so — buried in their privacy policies.

Keepsafe
❌ Avoid
Price: $9.99/month ($120/year)Downloads: ~70k/month (TrendApps)Revenue: ~$700k/month iOS

The biggest name in the category. Keepsafe's own product page describes itself as "cloud photo storage" — your photos go to their servers. Their privacy policy confirms data may be stored in the US or abroad.

Amplitude published a case study about how Keepsafe uses behavioral tracking to optimize pricing. In a separate article, they mention "6 billion events and counting." That's the scale of data collection inside a "privacy" app.

Data loss reports are common on Reddit: May 2025, March 2025, January 2025.

Private Photo Vault
⚠️ Caution
Price: ~$40/year in subscriptionsDownloads: ~70k/month (Sensor Tower)Revenue: ~$1M/month iOSScore: 0/100 safety (JustUseApp)

One of the oldest vault apps (since 2011). The safety score is based on NLP analysis of 981,000+ user reviews — not a formal audit, but a signal.

The UI feels dated. The security architecture predates modern authenticated encryption standards. Despite this, it still pulls $1M/month — largely because it's been around long enough to accumulate reviews and search ranking.

HiddenVault
❌ Avoid
Price: $2.99/week ($155/year)

Their own website lists "iCloud Backup + Restore" as a premium feature. Your "hidden" photos sit on Apple's servers — accessible via your iCloud account, included in backups, and subject to any data requests Apple complies with.

$155/year for iCloud storage with a PIN screen on top.

The real issue

A PIN on an app is not encryption. It's a UI gate. It stops someone from casually opening the app. That's it.

It does nothing against someone with filesystem access, a compromised backup, the developer themselves, or a legal request to their server provider.

Actual privacy requires: encryption where the developer can't access your data, local-first architecture where photos are encrypted on-device before anything else, end-to-end encryption for any cloud sync, and no behavioral analytics. Most vault apps fail every one of these.

Inner Gallery encrypts every photo on-device. Key derived from your PIN via PBKDF2, 100k iterations. Zero analytics, zero tracking SDKs. The app is local-first: all encryption happens on your device before anything else. Optional iCloud sync (v1.2.0) is end-to-end encrypted — even Apple cannot read your data. Panic spaces are never synced.

How to check your current vault app

  1. Does it work in airplane mode? If not, it's talking to a server.
  2. Read the privacy policy. Search for "cloud", "servers", "third party". You might be surprised.
  3. Does it explain how it encrypts? Vague claims like "military-grade encryption" with no specifics is a red flag.
  4. Check Exodus Privacy for tracker reports on the Android version — it lists every SDK an app bundles.

Related reading:


Download Inner Gallery on the App Store