How it Works
SECR operates through encrypted communication layers, decentralized identity storage, and local-only security controls. The platform avoids centralized user databases, minimizing reliance on servers while keeping communication fast and reliable. Messages, calls, and wallet actions stay under the user’s control at all times.
1. Decentralized Identity
SECR does not store or manage user identities on a central server. No phone numbers, emails, or personal data are required.
A user’s identity key is created and stored only on their device, making registration fully decentralized. SECR servers cannot identify users, map connections, or reconstruct communication patterns.
2. Encrypted Communication Layer
Messages, calls, media, and group chats use end-to-end encryption. Only the sender and receiver can decrypt content.
SECR servers never store readable messages or encryption keys. They simply pass encrypted packets without knowing what’s inside or who they belong to.
This creates a decentralized-style communication flow where the devices—not the servers—handle identity, keys, and message history.
3. Decentralized Data Storage
SECR stores all sensitive data locally on the device:
• identity keys • chat history • media files • hidden chats • wallet keys
Nothing is backed up to SECR servers or cloud storage. Users alone control their information, making data storage decentralized and user-owned.
4. Network Anonymity and Routing
SECR protects users through encrypted transport and optional anonymity layers:
• inbuilt VPN • optional TOR routing • multi-node routing paths • fallback relays for restricted regions
Even though SECR uses servers for message relay, the routing system is designed so no single server has control or visibility over user identities or communication content.
5. Local-Only Security Controls
All high-security features operate on the device:
• PIN-locked chats • hidden chats • Destruct PIN wipes • encrypted local vaults
Since SECR cannot access or restore this data, users maintain full decentralized control of their security state.
6. Self-Custody Wallet With Username Transfers
SECR includes a simple self-custody crypto wallet. Private keys are generated and stored on the device, not on centralized servers.
Users can send crypto to SECR usernames without exposing wallet addresses. SECR handles internal address lookup locally, keeping wallet identifiers decentralized and private.
Last updated