How Watfoe protects your chats.
This page is for the curious. Below is a structured overview of the cryptography and security model we use. We’ll fill in details as the product ships.
Overview
[High-level summary of the security model in 3–5 sentences.]
Threat Model
[Define attacker capabilities and non-goals.]
X3DH
[Describe how sessions are established asynchronously.]
Double Ratchet
[Describe message key rotation and recovery properties.]
Key Management
[Identity keys, prekeys, and rotation policy.]
Metadata Minimization
[What metadata exists and how it’s reduced.]
Safety Verification
[Safety numbers, verification steps, or trust UX.]
Group Messaging
[How group keys are handled.]
Forward Secrecy
[How past messages remain secure after compromise.]
Post-Compromise Security
[How sessions recover once an attacker is removed.]
Audits and Reviews
[External audits, bug bounty, or review cadence.]
Join the waitlist
Want launch updates?
We’ll email you when Watfoe is ready to download.