iOS — Under App Store review
Android — In development
Use the web app now ↗
iOS · Android · Web · Switzerland

LIA
Legal Intelligence

A zero-knowledge encrypted vault for your legal documents. Files are encrypted on your device before upload — we never see your data.

🔐 End-to-end encrypted 🇨🇭 Swiss law 🌐 Web app live iOS · coming soon Android · coming soon Zero-knowledge
Use now on Web App
Coming to the App Store
Coming to Google Play
Support

Your documents, sealed.

LIA is built for anyone who needs to store sensitive legal files — without trusting a third party with the contents.

🔐
End-to-end encryption
Documents are encrypted on your device using AES-256 before any data leaves it. The keys never leave your device.
📁
Legal document vault
Store contracts, correspondence, evidence, and case files in one secure, organised place.
🕰
Timeline builder
Attach documents to dated events and build a chronological timeline of your case — exportable to PDF.
📄
PDF export
Generate structured PDF reports of your documents and timeline, ready to share with a lawyer or court.
👁‍🗨
Zero-knowledge architecture
Architect-DNA Systems holds no encryption keys. Even if our servers were compromised, your files remain unreadable.
Web · iOS · Android
Use it now at lia.architect-dna.ch. Native iOS and Android apps in development — same zero-knowledge encryption across all platforms.

Simple by design.

01
Create an account with your email
Only your email is stored — used for authentication via Supabase. No name, no phone, no personal details required.
02
Upload your documents
Select files from your device. LIA encrypts each file locally before uploading — the server receives only ciphertext.
03
Build your timeline
Tag documents with dates and add notes to construct an ordered account of events.
04
Export when you need it
Generate a PDF summary of your case — formatted and ready to hand to a lawyer, mediator, or authority.

How long would it take
to crack your vault?

LIA encrypts your files with AES-256. That means an attacker must guess your key from 2256 possibilities — a number with 77 digits. Here is what that looks like in practice, assuming they get extraordinarily lucky and try randomly without ever repeating a guess.

Attacker & hardware Speed Time to crack
💻 Your ex's MacBook Pro
M3 Pro, AES-NI, 1 core
~10⁹ keys/sec 3.7 × 1059 years
🎮 Serious gaming rig
RTX 4090, full GPU assault
~5 × 10¹⁰ keys/sec 7.3 × 1057 years
⚡ Frontier supercomputer
World's fastest civilian machine, Oak Ridge, USA — 37,000 GPUs
~1.85 × 10¹⁵ keys/sec 2 × 1052 years
🌍 All computers on Earth
Every phone, server, and data centre, running in parallel
~10¹⁸ keys/sec 3.7 × 1049 years
🕵️ Every government on Earth combined
NSA, GCHQ, FSB, MSS — all classified infrastructure, all cooperating (bold assumption)
~10²⁰ keys/sec 3.7 × 1047 years
☀️ A computer powered by the Sun
A Dyson sphere harvesting all solar output, converting it 100% to computation — purely theoretical
~10⁴⁰ keys/sec 3.7 × 1027 years
🌌
For context: the universe is 13.8 billion years old.
Even if every government on Earth pooled their most classified supercomputing infrastructure and ran it non-stop since the Big Bang, they would have checked roughly 0.000000000000000000000000000001% of possible keys by now.

The math is not on their side. It never will be.

Note on quantum computers: Even a perfect, large-scale fault-tolerant quantum computer using Grover's algorithm — which does not exist and won't for decades — would reduce the problem to 2128 operations. At any realistic speed, that is still hundreds of times the age of the universe. AES-256 was specifically chosen to remain secure in a post-quantum world.

Built in Switzerland.
Governed by Swiss law.

🇨🇭
Swiss jurisdiction
Governed by Swiss law · revDSG compliant
🔑
Zero-knowledge keys
We hold no encryption keys
📵
No analytics
No tracking, no ads, no third-party SDKs
✉️
Minimal data
Only your email address, for auth only