Vault 88 — by Mix-IP

Read once. Logged forever.

The secure reader for production scripts, lookbooks, sizzles, and dailies. Every viewer signs an NDA. Every page carries an 8-character forensic code unique to the recipient. Every open, every minute, every share is a row in the audit log. The reader is the surface. The Vault is the system of record.

Free to start. NDA-gated by default. 8-character forensic code per recipient.
Why Vault 88

Production scripts, lookbooks, sizzles, and dailies leak before they ship — and the project dies with the leak.

Email attachments forward themselves. Drive links travel further than you sent them. PDFs sit on hard drives long after the deal closes. Vault 88 closes the gap between “you have to read this” and “please don’t share this.” Every reader signs an NDA at the door. Every page carries an 8-character forensic code unique to that recipient. Every open, every minute of dwell, every screenshot attempt is a row in the audit log. When something does leak, you paste the watermark and Vault 88 tells you who it came from.

8 chars Forensic watermark An 8-character code unique to each recipient, multi-positioned on every page. Paste the code into the investigation lookup — it returns the reader.
100% NDA-gated No reader sees the first page until they sign. Custom NDA per share, platform default, or email OTP for external readers without an account.
3–4pm Time-window access Open the share for the studio meeting only. Lock it the moment the meeting ends. The reader goes dark on the recipient’s screen at the close of the window.
2 · 1 Devices · sessions Two devices per recipient, one session at a time. A new device asks the original recipient to confirm. Every binding logged on-chain.
Deep dive · reader

A reader, not a download.

Vault 88 doesn’t ship PDFs. Every share is a reader — in-app for logged-in 88 Forge users, a responsive PWA on phone or tablet, or an external link gated by email OTP and NDA for buyers, talent, and agents without an account. Same React app at every breakpoint, same audit log on every surface, same 8-character watermark on every page. Notes anchor to the page they reference, stay private until the reviewer submits, and carry the reader’s identity into the synthesis.

  • In-app reader opens inline from notifications, briefs, pitches, and opportunities — no detour through a separate vault destination.
  • Mobile + tablet PWA for execs reading on iPhone in the back of an Uber and writers marking up scripts on iPad. Breakpoint-optimized; same sign-in.
  • External share link at /vault88/:token — no account required. Email OTP, then NDA, then the reader. The same audit log applies.
  • Page-anchored notes with reviewer-source attribution and AI cleanup. Private until submitted; never escape the reader.
See it in the reader
Deep dive · forensic

Forensic by default.

Every page of every share carries an 8-character forensic code unique to the recipient, multi-positioned per page. If a screenshot leaks — into a group chat, onto a forum, into a competitor’s deck — you paste the code into the investigation lookup and Vault 88 returns the reader, the share, the issue date, and the dwell history. The leak doesn’t just get traced. It gets attributed.

  • Recipient-unique 8-char code rendered in the page header, footer, and gutter band — cropping out one position still leaves the other two.
  • Investigation lookup takes a leaked code and returns the reader’s name, organisation, email, the issue timestamp, and the full dwell history of every minute they spent.
  • Time-window access opens the share at a specific moment and locks it the moment that moment ends — the reader literally goes dark on the recipient’s screen.
  • Device + session caps — two devices per recipient, one active session, every binding logged. New device asks the original recipient to confirm.

What we promise, and what we don’t. The Vault 88 PWA is leak-traceable against casual leakers — visible 8-character forensic codes per recipient, multi-positioned per page. Defeated by OCR + retype, or by cropping out the watermark band. The Capacitor v2 native shell closes that gap on Android via FLAG_SECURE; iOS cannot prevent screenshots, but Vault 88 logs them and revokes the share. Honest pitch is the only kind that holds up in court.

Read the security model
Watermark · investigation Match found
Paste leaked code 8C·4F·2A·1B
Jordan Tate DocFront · jordan.tate@docfront.co
  • Issued 14 Apr 2026 · 09:12 GMT
  • Last seen 22:47 GMT · iPhone 15
  • Dwell 38 pages · 41 min
  • NDA signed 14 Apr 2026 · 09:11 GMT
Deep dive · notes

Notes that synthesize themselves.

Reviewers leave page-anchored notes in the reader. Notes stay private until the reviewer commits the round, so executives don’t see half-formed thoughts and writers aren’t reacting to a moving target. Once the round closes, Vault 88 runs an on-demand synthesis pass — cached per share, prompt-cached for cost — surfacing convergent themes across reviewers with the source notes still attributed by name. The summary is a starting point, not the verdict; the underlying notes are always one click away.

  • Page-anchored, not floating — notes pin to the page they reference, so “p.38 feels rushed” doesn’t become “wait, which page?” three weeks later.
  • Reviewer-source attribution — every note carries the reviewer’s name, role, and timestamp. Synthesis preserves attribution so writers know where to push back.
  • Private until submitted — senders see notes only when the reviewer commits. No half-typed reactions in the audit log.
  • AI synthesis on demand — convergent themes surfaced across reviewers. Cached per share, prompt-cached for cost. TTS word-level highlighting on the v1.1 roadmap.
See the synthesis flow
Reviewer notes 14 notes · 3 readers
Camila Restrepo p.38 22:14

tone here moves too fast — sit on the silence?

Maya Reza p.38 23:01

agree with Camila — we lose the beat. need 1 more page.

Jordan Tate p.67 07:42

the ending lands. would buy this on the strength of p.67 alone.

AI synthesis 5 themes · cached
p.38 Pacing — sit on the silence 2 readers
p.42 Motivation — clarify the turn overlap
p.67 Ending — buyers respond all 3
Deep dive · surfaces

Two surfaces. One Vault.

Vault 88 doesn’t add a new top-level destination. It lives where producers and creators already share IP-protected work — inside the Briefs surface for production docs and dailies, and inside the Pitches surface for greenlight materials. Same primitive on both: NDA gate, watermark, view tracking, time-window, page-anchored notes. Different audiences, same audit log.

  • Briefs → Vault tab — call sheets, scripts, sizzles, dailies. Producers share them with crew, talent, executives, external clients.
  • Pitches → Share Materials tab — treatment, script, sizzle, lookbook, budget. Creators share post-NDA materials with greenlight committees, studio buyers, attached talent, agents.
  • Same primitive everywhere — NDA, watermark, view tracking, time-window, device caps. The control surface doesn’t change between the two contexts.
  • No new top-level nav — producers and creators don’t learn a new mental model. Vault 88 surfaces where they already are.
See both surfaces
Overview Crew Vault Activity
Cadence S1 · call sheet day 03 VLT-2102 · 24 crew · locked 14 Apr
Sealed
Dailies · week 02 VLT-2103 · 6 reviewers · 3-4pm
Time-window
Treatment Share Materials Greenlight
Cadence S1 pilot · script + lookbook VLT-2104 · 14 recipients · 8C·4F·2A·1B
Sealed
Sizzle reel v3 VLT-2105 · 4 buyers · expires 02 May
NDA-gated
Deep dive · agents

Built for agents, too.

AI assistants are reading scripts and lookbooks now — researchers, development execs, and creators all delegate the first read to a model before the human picks it up. Vault 88 ships an agent-native inbox API and three MCP tools so your agent reads under the same NDA gate, the same 8-character forensic watermark, and the same audit log a human would. Same control surface. Different reader.

  • Agent-native inbox API — list shares awaiting NDA, sign in the agent’s name on the user’s behalf with explicit consent, read the share, anchor notes to the page.
  • Three MCP toolsvault88_inbox_list, vault88_share_read, vault88_search. Drop-in for Claude, ChatGPT, custom agents.
  • Watermark per agent — the 8-character code marks the agent reader the same way it marks a human, and the dwell history records every page the model read.
  • Same NDA, same audit log — if your agent leaks, you trace it the same way you’d trace a human reader. The compliance story holds.
Read the agent inbox docs
vault88 · agent inbox 3 MCP tools
vault88_inbox_list
List shares awaiting NDA. Returns share IDs, senders, expiry windows.
vault88_share_read
Read a share under NDA gate. Returns watermarked pages + audit row.
vault88_search
Full-text + page-anchored search across shares the agent has access to.
vault88_share_read · response application/json
{
  "share": "VLT-2104",
  "watermark": "8C·4F·2A·1B",
  "issued": "2026-04-14T09:12Z",
  "nda_signed": true,
  "agent": "claude-3-5-sonnet",
  "pages": 78,
  "ttl": "2026-05-14T09:12Z"
}
Content paths

Three paths in. One Vault inside.

Most shares land via the browser — drag a script into the create-share dialog, or pick a folder for dailies. For terabyte-class deliveries — raw 6K footage, multi-camera dailies, sound stems — install Pro Transfer App Desktop. Pro Transfer App verifies every byte, resumes across network drops, and stamps the registration hash that lands in Vault 88 with the per-file integrity record. The pipe and the room share the same brand DNA: encrypted in transit, encrypted at rest, authenticated end-to-end.

  • Browser drag-and-drop for individual files. Fast for scripts, lookbooks, and PDFs under a few hundred MB.
  • Browser folder upload with parallel multipart for medium-size folders. Filename hygiene is byte-for-byte parity with Mix-IP’s production uploader.
  • Pro Transfer App Desktop for terabyte-class transfers. Folder integrity verified, network drops survived, per-file hash flows into the IP Registry record.
Browser drag-and-drop Scripts, lookbooks, PDFs — usually under a few hundred MB.
browser
Browser folder upload Parallel multipart, filename hygiene parity with the production uploader.
browser
Pro Transfer App Desktop Terabyte-class. Folder integrity verified. Survives bad networks.
Open

Pairs with the rest of Mix-IP.

Vault 88 is the secure-share layer for IP that the platform already understands. Every share is a row in the registry, a tab on a brief, a panel on a pitch, a pipeline event on an opportunity. The same IP, surfaced wherever the team is working.

Honest pitch

What we promise. What we don’t.

Honest pitch is the only kind that holds up against legal counsel and the only kind worth handing a studio buyer. Here’s the version of the security story that fits inside what we actually built — and the version we’ll tell you when the marketing copy can’t.

We promise

Leak-traceable against casual leakers.

  • 8-character recipient watermark. On every page, multi-positioned (header, footer, gutter band) so cropping out one position still leaves two.
  • NDA gate at the door. Custom per share or platform default. External recipients verify by email OTP before they see the first page.
  • Investigation lookup. Paste a leaked watermark and Vault 88 returns the recipient, the share, the issue date, and the dwell history.
  • Time-window access + device caps. Open the share at a moment, lock it the moment it ends. Two devices per recipient. One active session.
We don’t promise

Defeat against a determined leaker.

  • Defeated by OCR + retype. Also defeated by cropping out the watermark band entirely. The PWA is leak-traceable, not leak-proof.
  • iOS cannot prevent screenshots. No public API, even in native. Vault 88 logs the screenshot, alerts the sender, and revokes the share — that’s the best Apple allows.
  • Capacitor v2 closes the Android gap. Implemented via FLAG_SECURE. iOS still detects-and-revokes only. Both ship as v2 native shells, not v1.
  • Not zero-knowledge. Mix-IP can read your shares for support, abuse review, and audit response. End-to-end client encryption is on the roadmap, not in v1.

Vault 88

Read it. Watermark it. Trust it.

Free with every Mix-IP plan. NDA-gated by default. The reader is the surface; the Vault is the system of record.

Start a free Vault