What Cipher Does Not Do

Cipher Limitations and Boundaries

Cipher enforces a strict local and deterministic encryption model. However, there are key limitations and boundaries it does not — and will never — attempt to cover.

1. No Server-Side Backup or Recovery

Cipher is fully stateless. This means:

  • If you lose your private key, public key, or structured channel, Cipher cannot help you recover anything.

  • There is no backup, no recovery email, no password reset — you are solely responsible for the safe retention of your parameters.

  • Cipher will never introduce a fallback system that compromises its stateless guarantees.

2. No Identity Verification

Cipher does not verify if the key pairs or channels you use correspond to a legitimate identity. The system:

  • Does not validate the origin of a key or message.

  • Does not authenticate external identities or entities.

Users must ensure their counterpart’s identity and key integrity themselves, using out-of-band verification or physical exchange.

3. No Message History or Logs

Cipher does not store, log, or even recognize message history. All messages are:

  • Ephemeral by default

  • Stateless on creation

  • Non-traceable within the system

This also means: if you don’t save your ciphertext, it is permanently lost once the interface is closed or refreshed.

4. No Real-Time Communication Infrastructure

Cipher is not a messaging platform. It does not:

  • Handle message delivery

  • Provide chat UI or notifications

  • Maintain stateful sessions

All communications must be routed manually through external channels.

5. No Guarantee Against User Negligence

Cipher is robust against cryptographic attacks, but not against human error. It cannot protect against:

  • Users choosing weak or invalid structured channels

  • Keys stored in insecure environments

  • Failure to update or rotate keys when necessary

Cipher's guarantees end where user diligence fails.

Last updated