The Decryptor
ENTER YOUR DECRYPTOR KEY
Your Keys. Your Control.
One Device. One Identity.
Keys Live in RAM Only
Key Derivation Process
Deriving Your Keys
Your cryptographic keys are derived locally from your Decryptor password. If you skip recovery, no one can recover it. If you enable recovery, only hashes are stored.
// Your Decryptor Password password = "..." // Key Derivation seed = Argon2id(password, salt) private_key = Derive(seed) public_key = Derive(private_key) // Only YOU hold these keys
Exclusive Control
Your keys are derived deterministically from your Decryptor secret. No one else can decrypt your data without it.

A cryptographic device key is generated on first login; only the public key is stored server-side, and rebinding requires explicit user action.

Zero Trust Architecture
The whole system was designed with the assumption that your data might be breached. Your Decryptor is the only 'source of trust' for decrypting your data.


End-to-End Encryption
Messages and shared media are encrypted on device and decrypted only by intended recipients.


