EchoVault

Encrypted field evidence capture for human rights documentation

Score: 7.6/10TZHard BuildReady to Spawn
Brand Colors

The Opportunity

Problem

East African activists face arbitrary detention, brutal torture and sexual assault by Tanzanian police when conducting cross-border human rights work.

Solution

EchoVault is a mobile app that lets activists instantly record police encounters with military-grade encryption. Files are automatically uploaded to a zero-knowledge vault, timestamped on blockchain, and can be selectively shared with trusted lawyers or international bodies using ephemeral links that self-destruct after viewing.

Target Audience

East African human rights activists and independent journalists traveling for advocacy

Differentiator

End-to-end encryption where even the company cannot access content, combined with one-tap 'sexual assault evidence' templates and automatic chain-of-custody logging specifically designed for cases of torture and sexual violence by state actors.

Brand Voice

empowering

Features

One-Tap Secure Record

must-have55h

Instantly starts encrypted video/audio recording with misleading UI if device is seized

Zero-Knowledge Vault

must-have70h

Client-side encrypted storage with user-held keys

Blockchain Timestamping

must-have40h

Proves evidence existed at specific time without revealing content

Ephemeral Sharing Links

must-have45h

Share evidence with lawyers that expires after single view or 48 hours

Incident Report Builder

must-have50h

Auto-generates structured reports from recordings with metadata

Duress Wipe

nice-to-have35h

Special code that remotely wipes vault and sends final beacon

Template Library

nice-to-have25h

Pre-made checklists for documenting sexual violence and torture

Offline-First Queue

nice-to-have30h

Records and encrypts locally until connection returns

NGO Submission Portal

future65h

One-click anonymous submission to ICC, HRW, Amnesty verification teams

Total Build Time: 415 hours

Database Schema

users

ColumnTypeNullable
iduuidNo
public_keytextNo
created_attimestampNo
last_wipedtimestampYes

evidence

ColumnTypeNullable
iduuidNo
user_iduuidNo
encrypted_urltextNo
content_hashtextNo
timestamped_txtextYes
incident_typetextYes
created_attimestampNo

Relationships:

  • β€’ user_id references users(id)

shares

ColumnTypeNullable
iduuidNo
evidence_iduuidNo
recipient_emailtextYes
expires_attimestampNo
viewedboolNo
created_attimestampNo

Relationships:

  • β€’ evidence_id references evidence(id)

API Endpoints

POST
/api/upload-evidence

Receives encrypted blob and stores reference only

πŸ”’ Auth Required
POST
/api/generate-share-link

Creates ephemeral viewing link with expiration

πŸ”’ Auth Required
POST
/api/timestamp

Submits hash to blockchain timestamping service

πŸ”’ Auth Required

Tech Stack

Frontend
React Native (Expo) + Expo AV
Backend
Node.js/Express
Database
PostgreSQL
Auth
Supabase Auth
Payments
Flutterwave
Hosting
Fly.io
Additional Tools
libsodium.js for client encryptionIPFS for decentralized storageAlchemy for blockchain timestamping

Build Timeline

Week 1: Encryption foundation

45h
  • βœ“ Client-side encryption architecture
  • βœ“ React Native recording UI with disguise mode
  • βœ“ Supabase project setup

Week 2: Vault & sharing

55h
  • βœ“ Zero-knowledge vault UI
  • βœ“ Ephemeral link system
  • βœ“ Duress wipe prototype

Week 3: Evidence workflow

50h
  • βœ“ Template library
  • βœ“ Structured report builder
  • βœ“ Offline queue system

Week 4: Blockchain & integrations

40h
  • βœ“ Timestamping integration
  • βœ“ Flutterwave billing
  • βœ“ Audit logging

Week 5: Security hardening

50h
  • βœ“ Penetration testing
  • βœ“ End-to-end encryption verification
  • βœ“ Beta deployment
Total Timeline: 5 weeks β€’ 380 hours

Pricing Tiers

Free

$0/mo

7-day retention

  • βœ“3 evidence captures/month
  • βœ“Basic encryption

Activist

$35/mo

None

  • βœ“Unlimited captures
  • βœ“Zero-knowledge vault
  • βœ“Blockchain timestamping
  • βœ“Ephemeral lawyer sharing
  • βœ“Template library

Guardian

$89/mo

None

  • βœ“All Activist features
  • βœ“Team vaults
  • βœ“Priority support
  • βœ“Direct NGO submission portal
  • βœ“Advanced duress features

Revenue Projections

MonthUsersConversionMRRARR
Month 18022%$616$7,392
Month 665028%$5,082$60,984

Unit Economics

$41
CAC
$460
LTV
6%
Churn
71%
Margin
LTV:CAC Ratio: 11.2xExcellent!

Landing Page Copy

Your evidence cannot be erased

Military-grade encryption and blockchain proof for activists documenting torture and sexual violence by Tanzanian authorities.

Feature Highlights

βœ“Record under duress with disguised interface
βœ“End-to-end encryption you control
βœ“Self-destructing links for lawyers
βœ“Automatic chain-of-custody on blockchain

Social Proof (Placeholders)

""I captured video of police assault and shared it safely with my lawyer without ever putting the file on my phone unencrypted." β€” Anonymous"
""The timestamping feature was accepted as evidence by the African Court." β€” Tanzanian human rights attorney"

First Three Customers

1. Private outreach to 15 independent journalists already documenting police brutality via trusted intermediaries. 2. Partner with the Legal and Human Rights Centre in Dar es Salaam to provide free Guardian accounts to their field investigators. 3. Present case studies at the African Commission on Human and Peoples' Rights session.

Launch Channels

Product Huntr/privacyTwitter #DigitalRightsFront Line Defenders networkSecureDrop community

SEO Keywords

encrypted evidence app activistshuman rights documentation toolzero knowledge vault tanzaniasecure video capture police brutalityblockchain timestamp human rights evidence

Competitive Analysis

Free
Strength

Excellent encrypted messaging

Weakness

Not purpose-built for structured evidence collection or legal chain-of-custody

Our Advantage

Specialized incident templates, blockchain timestamping and lawyer sharing workflows

Freemium
Strength

Secure note taking

Weakness

No video evidence focus or duress features for hostile environments

Our Advantage

Activist-specific templates and one-tap recording optimized for field use under pressure

🏰 Moat Strategy

Security moat through specialized encryption patterns and growing library of verified legal templates that improve over time with lawyer feedback.

⏰ Why Now?

Cheap mobile encryption libraries, maturing blockchain timestamping services, and rising demand for admissible digital evidence in African human rights courts have converged.

Risks & Mitigation

legalhigh severity

Developer could be targeted by state actors

Mitigation

Open source the client, operate through legal entity in friendly jurisdiction, partner with digital rights defense organizations

technicalhigh severity

Encryption implementation flaws

Mitigation

Third-party security audit before launch and bug bounty program

Validation Roadmap

pre-build21 days

Conduct 20 confidential interviews with activists who have documented police violence

Success: At least 15 express strong willingness to adopt encrypted evidence tool

mvp50 days

Private beta with strict NDAs and 25 power users

Success: Minimum 40 pieces of evidence successfully captured and shared with lawyers during beta

Pivot Options

  • β†’Enterprise version for large international NGOs managing evidence archives
  • β†’Training platform teaching secure documentation practices
  • β†’Expand to Latin American indigenous rights defenders

Quick Stats

Build Time
380h
Target MRR (6 mo)
$3,800
Market Size
$3.1M
Features
9
Database Tables
3
API Endpoints
3