Encrypted memory for
your AI agents.
IA Cloud Memory stores your AI's long-term memory as a versioned, end-to-end encrypted file tree. Connect it to Claude Code with one line of config — and we never see what your agent remembers.
{
"mcpServers": {
"ia-cloud-memory": {
"command": "npx",
"args": ["-y", "@ia-cloud-memory/mcp-server"],
"env": {
"ICM_API_URL": "https://ia-cloud-memory.ilygo-app.ch",
"ICM_API_KEY": "icm_••••",
"ICM_MASTER_KEY": "••••"
}
}
}
}Everything an agent's memory should be.
End-to-end encrypted
AES-256-GCM with per-object content keys, wrapped under a master key derived in your browser. The server only ever sees opaque ciphertexts.
Git-like history
Every change is a commit. Diff between any two points, roll back to a previous state, walk the full chain — without ever reverting.
Cheap key rotation
Rotate your master key without re-encrypting content. Per-object CEKs are simply re-wrapped — 66 bytes per file.
Drop-in MCP connector
Add four lines to your Claude Code settings and your agent gains a persistent, queryable memory across sessions.
Per-user isolation
Multi-tenant from day one. Each account has its own ciphertext namespace; cross-user reads are impossible by construction.
Web UI included
Browse, edit, diff, and roll back from the dashboard — same crypto, same vault. No CLI required.
Two passwords. One vault. Zero servers that can read it.
Sign in
Your account password authenticates with IA Cloud Memory. It never derives encryption keys — and is hashed (scrypt) on the server.
Unlock the vault
Your separate encryption passphrase derives a master key in the browser via PBKDF2-SHA256 (600 000 iterations). The key never leaves your device.
Use freely
Read, write, commit, diff, rollback — through the web UI or via the MCP connector in Claude Code. Encryption happens transparently.
Treated as untrusted storage.
The IA Cloud Memory server stores three things and three things only: opaque ciphertexts, opaque per-object key wraps, and a list of commit hashes. There is no path through the API that could leak the plaintext of a file — the server doesn't have the key.
Lose your encryption passphrase and your data is unrecoverable. We consider this a feature.
Read the security model →Object ::= magic||v||flags||nonce||AES-GCM(content, CEK)
Wrap ::= magic||v||flags||nonce||AES-GCM(CEK, masterKey)
Manifest ::= encrypted JSON { path → contentHash }
Commit ::= encrypted JSON { parent, manifestHash, message }
Ref ::= "main" → commitHash (CAS-protected)Plug it into your agent in 30 seconds.
The @ia-cloud-memory/mcp-server package speaks the Model Context Protocol over stdio. Once registered, your Claude Code agent gains 8 memory tools:
memory_list· list all pathsmemory_read· read a filememory_write· write + auto-commitmemory_delete· delete + auto-commitmemory_history· recent commitsmemory_read_at· read at a past commitmemory_diff· diff between commitsmemory_rollback· revert to a past state
Give your agent a memory it actually owns.
Free during beta. No credit card. Encryption keys stay on your machine.