For the first time, her laptop felt like a vault, not a kite. Two years later, Elara sat on a panel at a privacy conference. A young developer from Proton stood nervously at the podium.

He clicked a slide. It showed the architecture: local SQLite encryption, hardware security module integration, a sandboxed rendering engine that couldn't touch the network stack without asking for a key every thirty seconds.

Until the night of the blackout.

Her source, a heavyset man named Kael who smelled like rain and cheap coffee, refused to use anything else. "The web is a sieve, Elara. Your browser is a house with a broken lock." He’d slide her encrypted USB sticks across the table in Prague train stations. But the emails—the scheduling, the “are you safe?” check-ins—those lived in the browser.

She gasped. There, in a local encrypted cache, were the last 2,000 emails. Not as plain text—never that—but as shimmering ghosts she could decrypt with a single click of her private key stored securely in the OS keychain. She typed a frantic message to her editor:

She downloaded it with a prayer.