Skip to content
On this page
HUSH
CIRCUITS

Encryption

Encryption screen manages the local encryption identity fingerprint used by the app's security UX.

DEFENSE IN DEPTH

Security layers protecting your communications

๐Ÿ”‘
APP PIN LOCK L1

Local 6-digit PIN with lockout after 5 failed attempts. Biometric option available.

ACTIVE
๐Ÿšจ
DURESS PIN L2

Secondary PIN that triggers silent wipe or sends distress signal when entered under coercion.

ACTIVE
๐Ÿงฎ
VISUAL CAMOUFLAGE L3

Calculator disguise mode hides the app behind a functional calculator interface.

ACTIVE
๐Ÿ”
AES-256 ENCRYPTION L4

Client-side key generation from entropy harvesting. Zero-knowledge architecture โ€” we never see your keys.

ACTIVE
๐ŸŒ
BRIDGE PROTOCOL L5

Two-leg call bridge ensures your device never contacts the target directly. No traceable connection.

ACTIVE
๐ŸŽค
VOICE MODULATION L6

Real-time server-side voice transformation prevents vocal identification and forensic analysis.

ACTIVE
ALL LAYERS: NOMINAL

Key Flow In UI

  1. Start generation sequence.
  2. Move pointer/finger to fill entropy progress.
  3. At 100%, fingerprint is generated and stored locally.
  4. Fingerprint is shown as active identity marker.

Reset Flow

  • BURN_IDENTITY_AND_REGENERATE
  • PIN challenge confirmation
  • final warning before reset

Implementation Notes

  • fingerprint is stored in localStorage (hush_encryption_fingerprint).
  • security events are logged through backend RPC calls.
  • reset invalidates prior local identity marker state.