Data in the vault is physically isolated, protected, and not accessible to other applications and services on the PC. Only users, processes, services, applications, other computers, or other entities that can be verified as trustworthy can access the vault's data.