Security & Threat Model

A public summary of HybridCipher's security posture, protections, and known limitations

πŸ›‘οΈ

Transparency Commitment

HybridCipher is an end-to-end encrypted group file sharing system with hybrid post-quantum key delivery. We publish this summary to set clear expectations and keep our security posture transparent as the system evolves.

Security Goals

πŸ”’

Confidentiality

Servers should never see plaintext file contents or epoch keys. All sensitive data remains encrypted end-to-end.

βœ“

Integrity

Files, group state, and key-delivery messages are authenticated. Tampering is detectable through cryptographic verification.

πŸ”„

Resilience

Rekeying, recovery, and transparency logs help detect or limit damage from compromise.

Primary Assets

The following assets are protected by HybridCipher's security architecture:

β€’Encrypted file contents and metadata
β€’Epoch keys and Welcome (key-delivery) payloads
β€’User credentials and device identities
β€’Session tokens and refresh tokens
β€’Signing keys (welcome, coverage, membership, transparency)
β€’Recovery artifacts (backup capsules)

Current Protections

βœ“

OPAQUE Authentication

Asymmetric password-authenticated key exchange that avoids reusable password hashes. The server never sees your password.

βœ“

Hybrid Key Delivery

X25519 + ML-KEM-768 for Welcome payloads. Provides both classical and post-quantum securityβ€”if either algorithm fails, the other still protects.

βœ“

ChaCha20-Poly1305 File Encryption

AEAD encryption with domain separation for file contents. High-performance, no hardware acceleration required.

βœ“

Ed25519 Signatures

Digital signatures for Welcome payloads and snapshot roots ensure authenticity and non-repudiation.

βœ“

Signed Merkle Roots

Coverage and membership snapshots are cryptographically verifiable via Merkle tree proofs.

βœ“

Device Recovery Workflow

Secure recovery with OTP verification and automatic session invalidation for compromised devices.

βœ“

Transparency Checkpoints

Detect unexpected server history modifications through cryptographic audit trails.

βœ“

Rate Limiting & Logging

Server-side protections against brute force attacks and comprehensive audit logging.

Threats Considered

🌐

Network Attackers

Passive and active attackers including MITM, replay, and downgrade attacks on network traffic.

πŸ–₯️

Compromised Server

Malicious or compromised server attempting to access plaintext data or forge group state.

πŸ‘€

Compromised Member

Malicious or compromised group member or device attempting unauthorized access.

πŸ’»

Compromised Workstation

Attacker with access to a user's local machine attempting to extract keys or data.

πŸ“§

Compromised Email

Attacker with access to the recovery channel (email inbox) attempting account takeover.

πŸ”‘

Compromised Signing Infrastructure

Attacker with access to signing keys attempting to forge certificates or transparency proofs.

βš›οΈ

Future Quantum Adversaries

Adversaries with access to cryptographically relevant quantum computers. Our hybrid approach (X25519 + ML-KEM-768) provides long-term protection. Note: TLS remains classical today.

What HybridCipher Is Not For

βœ•

Endpoint Compromise Protection

If a device is infected or the mountpoint is exposed, plaintext can be stolen.

βœ•

Anonymity or Traffic Hiding

Metadata (timing, size, group membership) can still leak.

βœ•

Key Escrow or Lawful-Access Storage

There is no built-in escrow for decrypting user data.

βœ•

Replacing Backups

Recovery depends on user-managed recovery material; loss can be unrecoverable.

βœ•

Full Compliance Out of the Box

Operational controls and audits are still required for regulated environments.

Security Assumptions

βœ“

Trusted Client Endpoints

OS integrity, local storage, and device access controls are intact.

βœ“

Proper TLS Configuration

Proper TLS setup is enforced by third‑party infrastructure.

βœ“

Protected Signing Keys

KMS/HSM custody and IAM controls are in place.

βœ“

External Delivery Availability

Checkpoint delivery works; storage, CDN, and DNS services stay available.

βœ“

Secure Recovery Material

Recovery codes and backup artifacts are stored safely by users/admins.

Summary

HybridCipher provides strong cryptographic protections and hybrid post-quantum key delivery. We publish this summary to set clear expectations and to keep our security posture transparent as the system evolves.

Security Questions?

We're here to help with any security concerns or questions