Security Documentation

Security Whitepaper

A technical overview of Eclipse Veil's encryption, key management, zero-knowledge architecture, and security practices.

Last updated: February 2026 | Version 1.0

Contents

  1. Architecture Overview
  2. Encryption Protocols
  3. Key Management
  4. Zero-Knowledge Design
  5. Message Security
  6. Vault Encryption
  7. Authentication & Sessions
  8. Threat Model
  9. Metadata Handling
  10. Incident Response
  11. Independent Assessments

1. Architecture Overview

Eclipse Veil follows a zero-trust, client-first architecture. All cryptographic operations - key generation, encryption, and decryption - occur exclusively on the user's device. The server acts only as an encrypted message relay and storage service.

In Plain English

Think of Eclipse Veil like a postal service that only handles sealed envelopes. We move your messages and store your files, but everything is sealed (encrypted) before it reaches us. We never have the key to open anything.

The architecture consists of three layers:

2. Encryption Protocols

Message Encryption

All messages use AES-256-GCM (Advanced Encryption Standard with 256-bit keys in Galois/Counter Mode). This provides both confidentiality and authenticity - if a single bit of a message is tampered with, the entire message fails to decrypt.

Key Exchange

When two users start a conversation, they perform an ECDH (Elliptic Curve Diffie-Hellman) key exchange using the P-256 curve. This generates a shared secret that only those two users can compute, even though the exchange happens over the network.

Data at Rest

Data in Transit

3. Key Management

Each user has the following key pairs:

Password-Based Key Derivation

User passwords are never sent to the server in plaintext. A key derived via PBKDF2 with high iteration count is used for authentication, while a separate derivation encrypts the private identity key.

Group Chat Keys

Group conversations use a versioned group key system:

4. Zero-Knowledge Design

Zero-knowledge means the server has no ability to read user data, by design rather than by policy. Here's what the server can and cannot see:

What the Server Never Sees

Message content, file contents, vault items, private encryption keys, password plaintext, recovery phrases

What the Server Does See (Minimal Metadata)

Encrypted message blobs, encrypted file blobs, user handles (pseudonymous), timestamps of message delivery, conversation participant IDs (not content), encrypted public keys

This means that even if our servers were fully compromised, an attacker would only obtain encrypted data they cannot decrypt without individual users' private keys.

Zero-Knowledge Backup

The backup system uses a BIP39-compatible recovery phrase (a sequence of English words). This phrase derives a key that encrypts your account recovery data. The recovery phrase is generated on your device and never transmitted to the server. Without it, no one - including us - can restore your account.

5. Message Security

Message Lifecycle

  1. Compose: User writes a message on their device
  2. Encrypt: Message is encrypted using AES-256-GCM with the shared conversation key
  3. Transmit: Encrypted blob is sent over TLS 1.3 to the server
  4. Store: Server stores the encrypted blob (cannot read it)
  5. Deliver: Server relays the encrypted blob to the recipient(s)
  6. Decrypt: Recipient's device decrypts using their copy of the conversation key

Disappearing Messages

When enabled, messages are scheduled for deletion after the configured time period. Deletion occurs on both sender and recipient devices, and the encrypted server-side copy is also removed. Deletion timers range from 5 seconds to 30 days.

View Once

Photos and videos sent as "View Once" can only be opened a single time by the recipient. After viewing, the content is immediately deleted from all devices and the server.

6. Vault Encryption

The encrypted vault stores documents, notes, and files. Each item is encrypted client-side using AES-256-GCM before upload. The encryption key is derived from the user's master key, ensuring that vault contents are inaccessible to the server.

7. Authentication & Sessions

8. Threat Model

What We Defend Against

What We Do Not Defend Against

Transparency requires honesty about limitations:

9. Metadata Handling

We minimize metadata collection to the greatest extent possible while maintaining service functionality:

10. Incident Response

Eclipse Veil maintains an incident response framework:

11. Independent Assessments

Current Status

Eclipse Veil is actively pursuing independent third-party security assessments. We are in the process of engaging qualified security firms to audit our cryptographic implementations, server infrastructure, and client applications. Assessment results will be published here upon completion.

Planned assessment scope:

We are committed to transparency. When assessments are completed, full reports (or executive summaries with actionable findings) will be published on this page.

Questions or Concerns?

If you are a security researcher and have found a vulnerability, please contact us at security@eclipseveil.pro. We welcome responsible disclosure.