Anonymity and Censorship Resistance
SECR is designed to operate safely in environments where communication is monitored, restricted, or intentionally disrupted. Its anonymity features protect user identity, while its routing systems ensure access even under heavy censorship.
1. No Phone Numbers or Real-World Identifiers
SECR does not use phone numbers, emails, SIM cards, or social profiles. Users register with device-generated identity keys, keeping identity fully decentralized.
This removes the primary link used by governments, ISPs, and platforms to track and correlate communications.
2. Encrypted Transport Layer
All traffic passing through SECR is encrypted before it leaves the device. External observers, including ISPs, network operators, and local authorities—cannot read:
• message content • file transfers • call connections • metadata inside the encrypted packet
Observers see only encrypted traffic with no identifying patterns.
3. Inbuilt VPN Tunneling
SECR includes an optional VPN layer that routes all app traffic through an encrypted tunnel. This prevents network monitoring tools from linking:
• IP addresses • location data • device information • communication habits
VPN mode helps users bypass local restrictions and maintain safe access.
4. Optional TOR Routing
For maximum anonymity, SECR can route its traffic through TOR. This hides the user’s IP address entirely and prevents destination servers from knowing where the connection originates.
TOR mode is ideal for users in high-risk regions or environments with aggressive surveillance.
5. Multi-Node Routing and Fallback Paths
SECR automatically switches routing methods if a network is blocked or disrupted. Fallback paths include:
• alternative relay nodes • disguised traffic patterns • domain fronting (where supported) • peer-assisted routing • VPN-to-TOR chaining
This ensures communication continues even if part of the network is censored.
6. Metadata Minimization
SECR reduces metadata exposure by avoiding:
• server-side contact lists • online status indicators • message timestamps on servers • address books • read receipts that reveal behavior
Even in a severe monitoring environment, metadata remains minimal or inaccessible.
7. Local-Only User Data
Sensitive information, identity keys, chats, media, wallet data, is stored only on the user’s device. If a server is compromised or seized, no user identities or communication logs can be reconstructed.
This decentralized structure removes the typical surveillance choke points used to track users across centralized apps.
8. Protection Against Traffic Fingerprinting
SECR’s traffic is padded and shaped to avoid recognizable patterns. This makes it harder for surveillance systems to classify SECR traffic or distinguish it from normal encrypted connections.
SECR’s anonymity and censorship-resistant design ensures users can communicate freely, safely, and privately, even in hostile or restricted environments.
Last updated