Experience giovium Everywhere
The cross-platform password manager tailored for power, privacy, and speed. Deploy anywhere: Desktop, Mobile with a Self-Hosted Server.
Why choose giovium?
giovium was exclusively born from a missing piece in the ecosystem: to try to bring user data firmly back into the hands of the people. Its core ethos is built upon absolute technological freedom. The platform operates without mandatory email accounts and without predatory premium paywalls.
It is a completely free password manager built on the latest technologies to be incredibly fast and natively compatible with iOS, Android, macOS, Windows, and Linux. Whether you are a casual user or an advanced technical operator, giovium is the perfect solution to securely store your passwords, rich texts, OTP secrets, and large files. By pairing down a cluttered market into a minimalist, distraction-free UI, it provides all the essential required functions without the extra friction—making it universally easy to configure and use.
Completely Free & Private
Operates with zero ads, zero tracking scripts, and zero locked features. Your data is purely yours.
Modern & Universal
Experience blazing-fast performance on the latest iOS, Android, Linux, and macOS platforms instantly.
Minimalist Powerhouse
Securely store passwords, keys, large text notes, file attachments, and direct OTP tokens in one pristine interface.
Offline-First Sync
Clients securely synchronize with your server without ever exposing your master password. The server knows absolutely nothing about your data.
Zero Cloud Accounts
Start instantly. giovium demands absolutely no email registrations, no phone numbers, and no account validations.
Advanced Cryptography
Powered by Ed25519, X25519, and XChaCha20-Poly1305. The absolute gold standard in modern secure-by-default architecture.
The True Free Alternative
See how giovium stacks up against the competition.
| Feature | giovium | Competition |
|---|---|---|
| Cost per User | 100% Free | $3–$5 / month |
| Ads & Tracking | Zero | Frequent telemetry & profiling |
| Account Requirement | None (Offline First) | Mandatory cloud email accounts |
| 2FA / OTP Generator | Included Free | Locked behind Premium Paywall |
| File Attachments | Included Free | Locked behind Premium Paywall |
| Features Pipeline | Fully Unlocked | Pay-to-Unlock feature upgrades |
Comprehensive Capabilities
Explore the full depth of giovium's platform.
Universal Platform & Experience
-
Universal Platform Support
Fully available and optimized across all major operating systems, including iOS, Android, macOS, Windows, and Linux.
-
Versatile Server Deployment
Server infrastructure can be deployed rapidly via Docker containers, Linux binaries, Windows executables, or macOS binaries.
-
Optimized User Interface
Features a minimalist, distraction-free interface with native support for both Light and Dark modes.
-
Responsive Design
Seamlessly adapts to portrait and landscape orientations on mobile phones and tablets.
-
iPad Split View Support
Natively supports iPadOS Split View to maximize productivity and enable seamless multitasking.
-
Unified Codebase
Utilizes a shared codebase across all platforms to ensure maximum reliability, consistent behavior, and rapid update deployment.
Cryptography & Advanced Security
-
Advanced Cryptographic Primitives
Employs industry-leading algorithms, including Ed25519 for server synchronization signing, X25519 for server synchronization encryption, and XChaCha20-Poly1305 for robust local data encryption.
-
Secure Key Derivation
Utilizes Argon2 for highly secure password derivation and HMAC for standard key derivation protocols.
-
Hardware-Level Security Integration
Leverages native device cryptographic functions and incorporates large, unique salts for every operation to guarantee maximum security.
-
Double Encryption Routing
Offers an optional secondary encryption layer for highly sensitive individual items.
-
Cryptographic File Hashing
Supports multiple file attachments per item with built-in hashing verification to ensure absolute file integrity.
-
Biometric Authentication
Integrates seamlessly with hardware-backed security modules (e.g., Secure Enclave) for safe, biometric-enabled encryption and decryption.
-
Anti-Espionage Safeguards
Actively protects against screen recording, direct screenshots, background screenshots, and visibility within the OS app switcher.
-
Self-Sufficient Transport Security
Clients and servers autonomously encrypt their connections without relying on external Certificate Authorities (CAs).
Zero-Knowledge & Absolute Privacy
-
Zero-Knowledge Architecture
Data is strictly encrypted at rest (on disk), in transit, and on the server 100% of the time. The server never holds the decryption keys.
-
Strict Ownership Verification
Demands explicit verification of the owner via the master password upon initial login.
-
Absolute Data Ownership
Operates without middlemen, account creation, or email recovery loops; privacy is governed entirely by the user.
-
Absolute Privacy & Zero Tracking
Guarantees complete data ownership with absolutely no embedded tracking codes, advertisements, or third-party error-logging tools.
-
Privacy Controls
Allows users to explicitly hide specific elements or fields from the standard view when necessary.
-
Just-in-Time Decryption
Individual items remain securely encrypted in memory and are only unlocked precisely when accessed by the user.
-
Intelligent Lock Management
Features smart auto-unlock from the background and customizable automatic lock timeouts.
Synchronization & Scalability
-
Multi-Server Synchronization
Supports simultaneous synchronization across multiple independent servers.
-
Efficient Data Mirroring
Facilitates highly efficient, real-time data mirroring across all connected clients and servers.
-
Instantaneous Synchronization
Ensures all data changes are pushed and pulled instantaneously across devices.
-
High-Performance Scaling
Maintains blazing-fast UI responsiveness and a minimal data footprint, even when managing thousands of entries.
-
Flexible Network Architecture
Operates securely over standard HTTP or custom ports, granting users the freedom to deploy behind a reverse proxy.
Data Integrity & Intelligent Workflows
-
Append-Only Versioning
Operates on an immutable data structure where nothing is deleted; modifications are appended, allowing users to restore previous versions.
-
Intelligent Conflict Resolution
Smart protocols automatically handle out-of-sync servers and items, permanently preventing data duplication.
-
Rigorous Consistency Verification
Automatically verifies data consistency during unlocking and supports extensive manual offline verification.
-
Automated Cloud Backups
Seamlessly integrates with iCloud on iOS to automatically back up the encrypted application state.
-
Offline File Access
Encrypted vault files can be securely accessed offline via native file managers for manual backup management.
-
Customizable Data Fields
Allows users to construct dynamic entries using text, text areas, concealed passwords, OTPs, and files.
-
Integrated Authenticator
Supports Time-based One-Time Passwords (TOTP) via manual entry or automatic generation through QR codes.
-
High-Performance Search
Features an optimized search engine capable of instantly filtering items by exact names or custom tags.