Two-Part Security Model
Model overview
The Two-Part Security Model is a security approach that splits sensitive information into two fully independent components.
In Decoy Phrase, these two components are:
Decoy Text — ordinary-looking text that appears normal and holds no security value
Mapping File — a private file that serves as the only key to recover the original data
The Original Secret is never stored in its complete form. System security does not rely on a single storage point, but on the requirement that both components must be present at the same time for recovery to be possible.
Security assumptions
This model is built on several core assumptions:
One part alone is insufficient
Decoy Text without the Mapping File is meaningless. The Mapping File without the Decoy Text is also unusable.
The two parts are stored separately
Separation across locations, media, or access contexts makes full compromise extremely difficult.
No central point of trust
There is no server, backend, or third party holding the recovery key.
Processing is performed offline
The risk of network-based leakage is minimized because no sensitive data is transmitted outside the device.
This model assumes that attackers are rarely able to access two locations, two contexts, and two different forms of data at the same time.
Failure scenarios
The Two-Part Security Model is designed to eliminate a single point of failure, but it still has limitations that must be clearly understood:
Decoy Text is exposed or known to others
No failure occurs. Decoy Text contains no sensitive information and cannot be used for anything without the corresponding Mapping File.
Mapping File is exposed without the Decoy Text
No failure occurs. The Mapping File has no meaning or function without the correct Decoy Text.
One part is lost (Decoy Text or Mapping File)
Recovery failure occurs. The Original Secret can never be recovered. This is a deliberate design consequence, not a system weakness.
Decoy Text and Mapping File are exposed together
Total failure occurs. The Original Secret can be fully recovered. This is the only condition under which security collapses.
User error (human error)
For example, storing both parts in the same location, using the same password, or sharing both with the same party. This risk comes from usage practices, not from the security model itself.
The system fails only when two components that are meant to remain separate are brought together. As long as this separation is maintained, practical failure is extremely unlikely.
Last updated
