Zero Knowledge

What zero-knowledge means in Decoy Phrase

In Decoy Phrase, Zero Knowledge means that the system has no technical ability to know or access seed phrases, sensitive data, file contents, file names, or user passwords.

This is not merely a privacy policy—it is a direct consequence of the system’s architecture :

chevron-rightAll sensitive data is processed fully offlinehashtag

Seed phrases and sensitive text are transformed locally within the Decoy Phrase Generator. No sensitive input is ever sent to a server or processed online.

chevron-rightData-Minimized Registrationhashtag

Decoy Phrase follows a data-minimization principle by design.

  • The system does not request or collect any personal or sensitive information, such as:

    • Email addresses

    • Phone numbers

    • Government IDs

    • Real names or identity documents

  • During registration, users are only required to:

    • Choose a username

    • Create a password

No additional identity verification, personal profiling, or recovery contact data is collected.

chevron-rightPasswords are never transmitted or stored in plaintexthashtag

Passwords used for permanent storage are processed locally on the user’s device. The application performs hashing and key derivation entirely in the browser to generate:

  • an Encryption Key

  • a Wallet Key

circle-info

Technology used: PBKDF2 (Password-Based Key Derivation Function 2) with high iteration counts (typically hundreds of thousands) and SHA-256, transforming user passwords into secure cryptographic keys.

chevron-rightClient-side encryption before uploadhashtag

Before any file is uploaded to permanent storage, its contents, metadata (including title), and owner identifiers are encrypted on the user’s device using AES-GCM 256-bit encryption.

chevron-rightNo decryption keys are ever held by the systemhashtag

Decoy Phrase does not store, receive, or have access to any encryption or decryption keys in any form. All encryption, decryption, and recovery processes run entirely on the user’s device.

chevron-rightPermanent storage only receives encrypted datahashtag

The permanent storage layer never sees plaintext data—only encrypted files that are meaningless without the user’s keys.

What the system never knows

By design, Decoy Phrase never knows:

  • Sensitive Data & Content

  • Seed phrases, private keys, passwords, recovery codes

  • User file contents

  • File title/name contents

  • The relationship between decoy text and mapping files

  • User passwords, encryption keys, or wallet keys

All files are encrypted in the browser before upload, so permanent storage only stores ciphertext (random data).

circle-info

Technology

  • Client-side encryption using AES-256-GCM

  • Implemented via the Web Crypto API (native to the browser)

  • Encryption keys exist only in browser memory and disappear when the tab is closed

What Decoy Phrase can see

  • Username / public identifier — stored as a public text string

  • Total files uploaded

  • Total files locked

All files are encrypted in the browser before upload, so permanent storage only stores ciphertext (random data).

circle-info

Explanation:

  • Because a public blockchain (Arweave) is used, usernames are stored as public identifiers in a registry so files can be rediscovered

  • Usernames are not linked to real-world identities (email, phone number, real name, etc.)

  • Account registration is permissionless and does not request personal identity data

Last updated