Hasher logo

END-TO-ENDENCRYPTED-ZERO-TRUSTARCHITECTURE

YOURKEYS.YOURCONTROL.YOURSECURITY.

The Decryptor

ENTER YOUR DECRYPTOR KEY

Your Keys. Your Control.

One Device. One Identity.

Keys Live in RAM Only

Key Derivation Process

Deriving Your Keys

Your cryptographic keys are derived locally from your Decryptor password. If you skip recovery, no one can recover it. If you enable recovery, only hashes are stored.

// Your Decryptor Password
password = "..."

// Key Derivation
seed = Argon2id(password, salt)
private_key = Derive(seed)
public_key  = Derive(private_key)

// Only YOU hold these keys

Exclusive Control

Your keys are derived deterministically from your Decryptor secret. No one else can decrypt your data without it.

Exclusive Control

A cryptographic device key is generated on first login; only the public key is stored server-side, and rebinding requires explicit user action.

Zero Trust Architecture

The whole system was designed with the assumption that your data might be breached. Your Decryptor is the only 'source of trust' for decrypting your data.

Zero Trust Architecture

End-to-End Encryption

Messages and shared media are encrypted on device and decrypted only by intended recipients.

End-to-End Encryption
Connect

Connect

Hasher logoHASHER

END-TO-ENDENCRYPTED-ZERO-TRUSTARCHITECTURE

YOURKEYS.YOURCONTROL.YOURSECURITY.