How Decoy Phrase Works
Decoy Phrase is an offline-first method for protecting and backing up seed phrases and sensitive text — without ever storing the original data.
It transforms secrets into harmless, ordinary-looking text, with recovery possible only by combining the private mapping file and the transformed text.
For long-term durability, decoy files and mapping files can be stored permanently via Decoy Phrase Permanent Storage, directly connected to the Arweave blockchain—ensuring they cannot be lost, altered, or deleted.
Core Idea: Two-Part Security Model
Decoy Phrase uses the Decoy Phrase Generator to split a secret into two separate parts:
1. Decoy Text
A transformed output that appears normal or random, but is not a seed phrase and cannot be used to access assets.
2. Mapping File
A technical file that serves as a recovery guide. It does not contain the seed phrase and remains meaningless without the correct corresponding Decoy Text.
The core security comes from this separation: no single file acts as a complete key to reconstruct the original secret.
Main Components (System Modules)
A. Decoy Phrase Generator
The core component that runs entirely on the user’s device and is responsible for:
Transform: seed phrase → Decoy Text + Mapping File
Recover: Decoy Text + Mapping File → original seed phrase
No server ever receives the seed phrase. All sensitive processing is performed exclusively on the client side.
B. Permanent Storage Layer
The storage layer used to persist artifacts permanently on the permaweb. Its functions include:
Storing the Decoy Text and Mapping File as two separate objects
Enabling cross-device access, as long as the user retains the required credentials or keys
Only the transformed and separated artifacts (and, if applied, encrypted data) are stored in permanent storage — never the original seed phrase.
C. Multi-Password Management in Permanent Storage
An access management model that allows Decoy Text and Mapping File to:
Be stored in different “areas” (separate vaults)
Use different passwords for each storage area
Data Flow
The system-level data flow is as follows:
Decoy Phrase operates as an offline-first, zero-knowledge system, where all sensitive operations happen on the user’s device, without any server, cloud, or backend involvement. Security is achieved through separation: neither the Decoy Text nor the Mapping File is sufficient on its own, and there is no central vault or single point of failure. Decoy Phrase never stores seed phrases in their original form, does not act as a custodian,
Last updated
