1. DISTRIBUTED ENCRYPTION KEY Local data is protected and encrypted by a distributed encryption key.

2. SECURE CHANNEL Two devices use one secure channel.

3. TRUSTED ENCRYPTION COMPONENTS Encryption core and protocol are based on X25519, XSalsa20 and Ed25519.

4. DOUBLE RATCHET Part of the cryptographic core that provides end-to-end encryption.

5. TRANSPORT LAYER SECURITY All trafic between server and client is secured by TLS. Provides server identity verification.



VERIFICATION 6. COMMUNICATIONVERIFICATION All communication is secured by client-server mutual verification mechanism.