Privacy Policy

Decoy Phrase is a secret-data protection application designed with an offline-first architecture. The application does not store sensitive data directly. Instead, it transforms secret data into decoy text and mapping files that can be stored separately by the user. All transformation and recovery processes are performed entirely on the user’s device without requiring an internet connection.

This approach ensures that no personal data is ever transmitted to any server or third party. Under the zero-knowledge principle, the service provider has no knowledge of the contents of your data. Only you have full control over your encryption keys and access to your data.

For long-term storage, users may optionally choose to store decoy text and mapping files permanently using the Arweave blockchain infrastructure. Although files are stored on a public network, all content and metadata are encrypted locally on your device before upload. This means only you can open and understand the files, as Decoy Phrase does not have access to any encryption keys. This feature is optional and designed to support data durability without compromising privacy or user autonomy.

This policy explains transparently how data is handled and affirms that no user tracking or personal data collection occurs without your consent.

Information We Do Not Collect

Decoy Phrase does not collect, store, or track personal information. Specifically, we do not:

chevron-rightStore sensitive data, including:hashtag
  • Seed phrases

  • Private keys

  • Recovery codes

  • Passwords

chevron-rightCollect personal identity information:hashtag
  • Name

  • Email address

  • Phone number

  • Location

  • Any other identifying data

chevron-rightTrack user activity:hashtag
  • Usage history

  • Session duration

  • Interaction patterns

chevron-rightUse cookies or third-party trackers:hashtag
  • No Google Analytics

  • No tracking pixels

  • No fingerprinting

  • No behavioral tracking mechanisms

Our architecture is intentionally designed so that we do not know who you are or what you store. We do not possess user data because we never collect it in the first place.

Limited Information Stored Locally

Certain non-personal operational data may be stored locally on your device, such as:

  • Interface preferences (dark mode, file ordering)

  • File metadata cache (basic file attributes such as filename, size, and timestamps, without any file content or sensitive data, stored locally only to improve loading performance)

  • Local session state (vault login status, last accessed file)

This information is never transmitted to any server and is stored only in local device storage (for example, browser localStorage). All processing and storage remain fully under your control.

Permanent Storage (Optional Feature)

As an optional feature, Decoy Phrase provides permanent storage using the Arweave network — a blockchain specifically designed for permanent data storage.

What is stored?

Only the following files may be permanently stored:

  • Decoy text (contains no original data)

  • Mapping files that are fully encrypted on the user’s device

triangle-exclamation

Is it secure?

Yes. The following protections apply:

  • End-to-end encryption: All files are encrypted locally using AES-GCM 256-bit before upload

  • No provider access: We do not possess, store, or have access to encryption keys

  • Zero-knowledge preserved: Even on a public network, stored files are meaningless encrypted data without your keys

  • No user identity: Uploads use an anonymous shared wallet system — no personal blockchain address, no private wallet, and no identity linkage

Storage characteristics

  • Immutable: Files cannot be deleted or modified after upload

  • Permanent: Files remain available indefinitely on the Arweave network

  • Non-custodial: Only you can decrypt and access the files. We cannot assist if keys or files are lost

Data Security

Decoy Phrase applies strict cryptographic and architectural principles to protect your data:

  • All encryption and decryption processes occur locally on the user’s device

  • No sensitive plaintext data ever leaves your device

  • We have no system to store or recover user data

In other words, your data is not only encrypted — it is never in our possession.

User Rights

With Decoy Phrase, you retain full control over your data. Your rights include:

  • Full ownership of all files and encryption keys

  • The ability to delete all files and local data at any time

  • Control over file separation and password management under the two-component security model

  • The option to avoid unencrypted cloud storage entirely

We cannot recover files, unlock data, or access your information — because only you have the technical ability to do so.

Changes to This Privacy Policy

We may update this Privacy Policy from time to time. Material changes will be announced on the official website or application interface. You are responsible for reviewing updates periodically. The effective date will always be stated at the top of this policy.

Contact

If you have any questions regarding privacy or data usage in Decoy Phrase, please contact us at:

📧 [email protected] 🌐 https://decoyphrase.comarrow-up-right

Final Statement

Your privacy is our highest priority. By designing a system that cannot access or know your information, we ensure that only you — and no one else, including us — has control over your sensitive data.

Last updated