01
Encrypt before upload
Client-Side Secret Encryption
Messages, links, locations, posts, and parties are encrypted in the client before upload.
The mobile app turns secret content into encrypted bundles locally, so the service stores ciphertext and metadata instead of plaintext message bodies.
02
Native-backed identity
Hash-Based Identity
Identity is derived from a recovery phrase and native key storage, then used for challenge-response login.
The app generates deterministic identity material locally, computes a stable hash ID from the public key, and signs login challenges on-device.
03
Browser decrypt
Viewer-First Web Opening
The website is built to open secrets in the browser, not to author them there.
Recipients open a share link, enter a passcode, request a ticket, fetch ciphertext, and decrypt locally inside the browser viewer.
04
Access gating
One-Time Ticket Access
Secrets are fetched through short-lived ticket issuance instead of anonymous unlimited reads.
The backend validates lifecycle state before issuing a ticket, consumes that ticket on fetch, and can burn the secret after open when policy requires it.
05
Second factor for secret access
Optional Device Binding
Some secrets can require a device-held key in addition to the passcode and link material.
When device binding is enabled, the app signs a backend challenge with a native device key before a ticket is granted for the secret.
06
Pinned host plus Tor
Transport Hardening
The mobile client can combine certificate pinning, Tor routing, and bridge modes for the pinned host.
Traffic to chat.anomonus.com can be evaluated for direct, Tor, or blocked paths, with native Tor transport and pinning diagnostics in the client code.
07
QR and stego ready
Multiple Open and Share Paths
Secrets can move through deep links, QR scans, and PNG steganography instead of one rigid share flow.
The app supports hiding Anomonus links inside PNG images and opening secrets from QR codes, raw links, or extracted hidden payloads.
08
Retention boundaries
Lifecycle and Wipe Controls
TTL, max views, burn-after-read, secure logout, and wipe audit are part of the implemented system behavior.
Secret lifetime and device state are treated as first-class controls, with explicit deletion, expiry, and post-delete audit paths in the app.