Security

How Watfoe protects your chats.

This page is for the curious. Below is a structured overview of the cryptography and security model we use. We’ll fill in details as the product ships.

End-to-end encryption keeps chats private.
Keys rotate often to protect past messages.
Verification steps help prevent impersonation.

Overview

[High-level summary of the security model in 3–5 sentences.]

Threat Model

[Define attacker capabilities and non-goals.]

X3DH

[Describe how sessions are established asynchronously.]

Double Ratchet

[Describe message key rotation and recovery properties.]

Key Management

[Identity keys, prekeys, and rotation policy.]

Metadata Minimization

[What metadata exists and how it’s reduced.]

Safety Verification

[Safety numbers, verification steps, or trust UX.]

Group Messaging

[How group keys are handled.]

Forward Secrecy

[How past messages remain secure after compromise.]

Post-Compromise Security

[How sessions recover once an attacker is removed.]

Audits and Reviews

[External audits, bug bounty, or review cadence.]

Join the waitlist

Want launch updates?

We’ll email you when Watfoe is ready to download.