Security Whitepaper

A concise overview of encryption, identity, and transport used by the platform.

Threat Model & Goals

Zero-knowledge architecture: servers cannot read content. Clients perform all encryption/decryption. Identities are emails; no phone numbers required.

Message & File Encryption

Client-side symmetric encryption using AES-256/GCM with random IVs. Keys are exchanged out-of-band, or via a mutually authenticated channel.

Voice/Video E2EE

Media encrypted end-to-end using SRTP with client-negotiated keys. Email address acts as identity; no SIM. Signaling metadata is minimized.

Key Management

Keys are generated client-side and never stored in plaintext on servers. For persistence, encrypted key material can be protected with passphrase-based KDFs.

Roadmap

  • Post-quantum KEM for key exchange
  • Forward secrecy rotation for message/file keys
  • Private contact discovery with zero-knowledge proofs