Device-Level Seizure and Forced Access

SECR is designed to protect users in situations where a device is seized, inspected, or accessed under pressure. These threats include border checks, raids, targeted confiscation, or scenarios where an attacker gains physical access to the user’s device. SECR reduces the risk of exposure by limiting stored data, isolating sensitive chats, and allowing users to destroy all local information instantly.


1. Local-Only Data Storage

SECR keeps all sensitive information exclusively on the device:

• messages • media files • identity keys • group data • hidden chats • wallet keys

No communication history or encryption keys are stored on SECR servers. If a device is seized, no external source exists to reconstruct conversations.


2. Hidden Chats & PIN-Locked Groups

Users can hide individual chats or entire groups so they remain invisible unless unlocked with a specific PIN.

• Hidden chats do not appear in the main chat list • They cannot be detected through normal device browsing • The existence of hidden chats is not advertised anywhere in the interface

This prevents casual inspection from revealing sensitive conversations.


3. Destruct PIN

SECR includes a Destruct PIN, a user-defined code that instantly wipes all SECR data from the device.

When entered:

• all chats are erased • media files are securely deleted • identity keys are removed • wallet keys are destroyed • hidden chats are permanently wiped

This feature is designed for emergency situations where the user needs immediate, irreversible protection.


4. Encrypted Local Storage

All SECR data is stored in an encrypted container. Even if someone extracts the app’s storage:

• messages are unreadable • media files remain encrypted • private keys cannot be reconstructed • group data stays locked behind multiple key layers

This protects against forensic tools attempting to scan the device.


5. No Server-Side Recovery

If the device is seized or wiped, SECR cannot restore data. There is no cloud backup or recovery mechanism.

This is intentional, a decentralized, zero-knowledge design ensures:

• no one can force SECR to provide data • no centralized database exists to leak user information • users retain full control of their privacy, not the platform


6. Safe Handling Under Pressure

In situations where a user is coerced to unlock the app, SECR’s layered PIN system provides multiple outcomes:

Normal PIN → opens regular chats • Hidden Chat PIN → reveals only selected private chats • Destruct PIN → deletes everything instantly

This gives users flexible control depending on the threat level.


7. Limitations (Honest and Realistic)

SECR cannot protect against all forms of physical compromise:

• If the app is open when the device is taken, content may be visible • Hardware-level exploits or jailbroken devices reduce security • Forced biometric unlocks may bypass PIN protections unless disabled • If a user delays using the Destruct PIN, data may be recoverable for a short period

These risks are important for users operating in high-threat environments.


SECR’s device-level protections ensure that sensitive information remains secure even during seizures or forced access attempts, giving users control, deniability, and immediate destruction options when needed.

Last updated