Risk Model Assumptions

Cipher Threat Model

Cipher’s threat model is based on a hostile and surveilled environment where:

  • No external system or server can be trusted

  • All communication layers may be compromised

  • Attackers may access device-level metadata, network traffic, and physical access

  • Users might be targeted with phishing, interception, or device-level intrusions

To remain resilient, Cipher adopts the following defensive posture:

1. Trust No Server

Cipher assumes:

  • Any server or cloud dependency is a liability

  • Centralized key storage or transmission is a structural flaw

  • Only fully client-side computation ensures true privacy

Cipher performs all cryptographic operations locally, without transmitting or receiving any data to/from servers.

2. Communication Channels Are Untrusted

Cipher considers:

  • All transport layers (email, chat apps, etc.) as exposed and non-confidential

  • Metadata (who, when, how often) as potentially revealing

  • Content visibility as the only protection scope

Cipher encrypts all messages to opaque ciphertext that cannot be correlated with the original data.

3. Endpoints Are Vulnerable

Cipher acknowledges:

  • Devices may be physically compromised

  • User sessions may be tampered with

  • Malicious apps may attempt to read local storage or screen content

Cipher encourages:

  • Minimal on-device persistence

  • No message logs

  • Stateless operation to reduce attack surface

4. Cryptographic Strength Alone Is Insufficient

Cipher operates under the principle that:

  • Secure channels must combine entropy, structure, and polymorphism

  • Layered encryption adds nonlinear complexity

  • Brute-force resistance is probabilistic, not deterministic

Cipher is designed to exponentially increase uncertainty per layer, making targeted decryption computationally infeasible.

Last updated