Security Documentation

Security & Privacy

A comprehensive technical overview of the security architecture, cryptographic methods, and privacy protections that make Cipher Messaging one of the most secure messaging platforms available.

Foundation

Core Security Principles

The foundational principles that guide every design decision in Cipher Messaging.

Zero Trust by Design

Never Trust, Always Verify

No component of the system—be it the app, network, or hardware—is inherently trusted. Every action is verified, ensuring that only authenticated users can access their messages and data.

End-to-end verificationNo blind trustAlways authenticated

Zero Metadata

Leave No Digital Footprint

Traditional messaging apps store metadata like who you're talking to, when, and from where. Cipher Messaging eliminates all metadata, ensuring no digital footprint is left behind.

No sender/recipient infoNo timestampsNo location data

End-to-End Encryption

Only You and Your Recipient

Every message is encrypted on your device before transmission and can only be decrypted by the intended recipient. No one—not even Cipher Messaging—can read your messages.

Device-level encryptionXChaCha20-Poly1305Forward secrecy

Decentralized Architecture

No Central Point of Failure

Cipher Messaging operates without central servers. All communication is peer-to-peer, making it impossible to shut down or compromise the entire network.

P2P communicationNo serversCannot be shut down
Cryptographic Foundation

The Cryptography Behind Cipher

Industry-leading cryptographic algorithms chosen for maximum security and performance.

Encryption

XChaCha20-Poly1305

Cipher Messaging uses XChaCha20-Poly1305, an authenticated encryption algorithm designed to securely encrypt and authenticate messages.

How It Works

XChaCha20 is a variant of the ChaCha20 stream cipher, widely regarded for its speed and security. Poly1305 is a message authentication code (MAC) that ensures the integrity of the message by verifying that it has not been tampered with during transmission.

Why We Chose It

XChaCha20 is designed to provide high security even with very large amounts of data. It is particularly well-suited for mobile devices due to its performance in software.

Technical Specifications

256-bit key192-bit nonce128-bit authentication tagAEAD cipher

Visual Overview

Plaintext

+

256-bit Key

XChaCha20

Stream Cipher

+

Poly1305

MAC Auth

Authenticated Ciphertext

Encrypted + Verified

End-to-End Encrypted

Data Flow in Cipher Messaging

Follow your message's journey through our zero-knowledge architecture

1

Create

Compose message

Your message is drafted locally on your device

2

Encrypt

XChaCha20-Poly1305

Military-grade authenticated encryption applied

3

Queue

Local storage

Encrypted data stored only on your device

4

Handshake

Ping-Pong protocol

Mutual authentication before transmission

5

Route

Tor network

Anonymous routing hides your identity

6

Deliver

Auto-delete

Message destroyed after reading

Zero Metadata
E2E Encrypted
Forward Secret
Auto-Deleted

Ping-Pong Wake Protocol

Mutual Authentication System

You
PING
Them
You
PONG + AUTH
Them
Secure channel established
You
ENCRYPTED MESSAGE
Them

Message Lifecycle

From Creation to Deletion

1

Created & Encrypted

XChaCha20-Poly1305 encryption on device

2

Stored Locally

Encrypted queue awaits recipient

3

Authenticated

Ping-Pong verifies both parties

4

Tor Transmission

Anonymous multi-hop routing

5

Delivered & Erased

Permanently deleted after reading

Multi-Layer Protection

Device & Network Security

Defense in depth: Hardware-level protection combined with network anonymity ensures your messages remain secure from device to delivery.

Tor Network Integration

Complete Network Anonymity

Every message travels through the Tor network's multiple encrypted relay layers, ensuring your IP address and physical location remain completely hidden from all network observers, ISPs, and even other users.

How it protects you: Tor creates an encrypted tunnel through three random relays before reaching its destination. Each relay only knows the previous and next hop—never the full path—making traffic analysis practically impossible.

Anonymous Message Route

Sender
1
Entry
2
Middle
3
Exit
Recipient
Your IP Address Hidden at Every Step

ISP Blind

Your internet provider can't see who you're messaging

Location Hidden

Recipients never learn your physical location

Traffic Analysis Resistant

Pattern-based monitoring becomes ineffective

Multi-layer EncryptionRandom Path SelectionZero IP Logs

Hardware-Backed Key Storage

Secure Enclave & StrongBox

Every private key used for encryption and signing is generated and stored exclusively within hardware security modules—Secure Enclave on iOS or StrongBox on Android—making them physically inaccessible to software, malware, or even the operating system itself.

Unbreakable isolation: These hardware modules operate on separate processors with dedicated memory. Even if your device is compromised, attackers cannot extract your private keys—they simply don't have access to the hardware vault where they're stored.

Security Layer Architecture

Your Device
Operating System
No Access
Applications
No Access
Secure Enclave / StrongBox
HARDWARE
Private Keys
Crypto Ops
Keys Physically Isolated from Software

Tamper-Proof Design

Physical attempts to access trigger self-destruction

Biometric Gatekeeper

Face ID or fingerprint required for key operations

Malware Immune

Even device compromise can't extract private keys

FIPS 140-2 Level 3Dedicated ProcessorSecure Boot Chain

Local Encryption

All data encrypted on-device

Zero Cloud Data

Keys never leave your device

Biometric Lock

Face ID & Touch ID support

Secure Deletion

Cryptographic erasure

Threat Protection

Protection Against Real-World Threats

Our comprehensive threat model defends against sophisticated adversaries, from passive observers to state-level surveillance operations.

Passive Network Observers

HIGH RISK

Entities monitoring network traffic without actively interfering

How Cipher Protects You

Cipher Messaging ensures that no one can passively monitor your communication. All messages are encrypted and metadata is eliminated.

FULLY PROTECTED

Active Defense Mechanisms

End-to-end encryptionZero metadataTor routing
Real-World Scenario

Someone monitoring your network traffic can't see who you're messaging, what you're saying, or even that you're using a messaging app.

PROTECTEDCIPHERPROTECTEDATTACKATTACKALL THREATS NEUTRALIZED
100%
Success Rate
0
Breaches
Emergency Protection

Duress Protection System

Built-in panic features that ensure your data self-destructs rather than falling into the wrong hands

Duress PIN

Emergency

Instant Self-Destruct System

When under coercion, entering your secret Duress PIN triggers immediate cryptographic destruction of all sensitive data. Attackers gain nothing, even if they force you to "unlock" the app.

Stealth Mode

Undetectable activation

The Duress PIN appears to unlock your app normally, giving no indication that data destruction is underway.

< 100ms

Key Destruction

Private keys permanently erased from secure enclave

Instant

Message Wipe

All conversations and queued messages deleted

Zero Trace

Revocation Signal

Emergency broadcast sent to all contacts

Network-Wide

Real-World Scenario

Border agents demand you unlock your phone. You enter your Duress PIN—the device appears to unlock normally, but all encryption keys and messages are already destroyed. Even forensic analysis cannot recover the data.

Emergency Activation Sequence

Duress PIN Entered

T+0ms

Appears as normal unlock

Cryptographic Destruction

<100ms

Keys destroyed, messages wiped

Revocation Broadcast

Emergency signal to all contacts

C1
C2
C3
Complete Data Erasure
<100ms
Execution Time
100%
Data Destroyed
Complete Protection

Security at a Glance

Every message benefits from multiple layers of cutting-edge security technology working in concert.

ACTIVE

E2E Encrypted

XChaCha20-Poly1305

ACTIVE

Tor Network

Anonymous Routing

PROTECTED

Hardware Keys

Secure Enclave

VERIFIED

Zero Metadata

No Data Logged

ACTIVE

Forward Secret

Rotating Keys

ENABLED

Auto-Delete

Timed Erasure

256-bit

Encryption Strength

Post-quantum ready

0 Logs

Metadata Collected

Complete privacy

3+ Hops

Network Relays

Maximum anonymity

Multi-Layer Defense Architecture

1

Application Layer

End-to-End EncryptionForward SecrecyMessage Authentication
Active
2

Network Layer

Tor RoutingTraffic ObfuscationIP Masking
Active
3

Device Layer

Hardware SecuritySecure EnclaveBiometric Lock
Active
4

Data Layer

Zero MetadataAuto-DeleteSecure Wipe
Active

Military Grade

Encrypted

Verified

Zero Trust

Military-Grade Security for Everyone

Our security architecture is designed by cryptography experts with military-grade encryption. Experience privacy protection that defends against even nation-state adversaries.