Threat Model & Security Notes

Nyxen is designed for privacy, not invincibility. This document defines what Nyxen actually protects you from — and what remains your responsibility. It’s a practical threat model, not a marketing promise.


1. Purpose

The goal of Nyxen’s security model is simple: to minimize digital residue from sensitive collaboration and communication.

That means:

  • No permanent logs.

  • No plaintext data in infrastructure.

  • No trust in Nyxen itself beyond relay uptime.

  • No illusion that encryption can fix poor operational security.

[!NOTE] Nyxen’s architecture limits what can leak, not what users can do. Security begins at the edge — your device, your discipline, your network.


2. Threat Model Summary

Threat Category
Example
Protected?
Notes

Server compromise

Relay or database breach

No plaintext content; ciphertext deleted on TTL/burn

Metadata leak

IP, access logs

⚠️

Minimized; mitigated with Tor mode

Traffic interception

MITM / passive network surveillance

TLS 1.3 + AES-GCM + optional Tor routing

Key compromise (server)

Extraction from backend

Keys never sent to server

Key compromise (client)

Malware, keylogger, memory dump

Out of scope; endpoint risk

Human error

Shared key in wrong channel

Social/operational risk

Local logging

Screenshots, clipboard, screen capture

Cannot be mitigated in software

Replay / tampering

Resend old ciphertext

Nonce + integrity tag validation

Accidental retention

Forgotten files or caches

⚠️

Local wipe triggered, but browser persistence risk remains

Anonymity / identity link

IP correlation

⚠️

Use Tor mode for high-anonymity ops


3. Security Goals

Goal
Description

Confidentiality

Only authorized peers can read content.

Integrity

Encrypted content cannot be modified without detection.

Ephemerality

Everything disappears on time or command.

Minimal metadata

Routing data never expands to analytics.

Pseudonymity

Nyxen doesn’t require accounts or personal info.

[!TIP] Nyxen replaces “access control by identity” with “access control by possession.” Whoever holds the key has access. That’s the model.


4. Security Guarantees

✅ Guaranteed by Architecture

  • End-to-end encryption for all primitives (AES-GCM, derived per-context keys).

  • Automatic TTL enforcement and cascade burn on expiry.

  • Zero plaintext on Nyxen servers.

  • No stored credentials, user accounts, or persistent identity maps.

  • Enforced minimal metadata (TTL, routing only).

  • Immutable non-recoverability after burn/expiry.

  • Same crypto model on clearnet and Tor.

⚠️ Partially Mitigated

  • IP-level anonymity (stronger via Tor).

  • Browser cache behavior (handled by app but dependent on user agent).

  • Time correlation across channels (e.g., user activity patterns).

  • Physical endpoint access (if device compromised).

❌ Not Mitigated

  • Local screen recording, screenshots, or transcript saving.

  • Compromised or monitored device OS.

  • Intentional key sharing or human error.

  • Network-level capture after local decryption.


5. Data Lifecycle (Security Flow)

[Create Object]

Encrypt (Client)

Send Ciphertext to Relay

Relay stores (TTL countdown)

Expire or Burn

Relay purges + Clients wipe keys

Nothing recoverable

Burn Signal Structure

{
  "context_id": "C-492",
  "burn": true,
  "timestamp": "2025-11-11T22:00:00Z"
}

Relay Behavior

  • Purges ciphertext immediately.

  • Broadcasts burn signal to connected clients.

  • Deletes local cache.

Client Behavior

onBurn(contextId) {
  clearLocalStorage(contextId);
  revokeKeys(contextId);
  showNotice("This Nyxen context has been destroyed.");
}

6. Cryptographic Standards

Function
Standard / Library

Symmetric Encryption

AES-GCM-256

Key Derivation

HKDF (SHA-256)

Randomness

Web Crypto API / libsodium

Transport

TLS 1.3 / DTLS-SRTP

Optional PQ Transition

Hybrid Kyber + X25519 (research stage)

Keys and nonces are never reused. All payloads are authenticated.

[!NOTE] No compression or dynamic content encoding occurs before encryption to prevent CRIME/BREACH-style leaks.


7. Network Topology

  • Relays are stateless message brokers.

  • Each relay enforces TTL locally.

  • Data replication between relays uses encrypted payloads only.

No relay sees decrypted content or cross-context links.

Diagram:

[Client A] ←TLS→ [Relay 1] ←TLS→ [Relay 2] ←TLS→ [Client B]
Ciphertext-only path
No plaintext, no keys, no inspection

8. Attack Scenarios

Scenario 1 — Relay Breach

Outcome: Attacker obtains ciphertext. Mitigation: No decryption possible; TTL deletion still removes data.

Scenario 2 — Compromised Client

Outcome: Attacker gains key in memory. Mitigation: None; Nyxen cannot secure a compromised endpoint.

Scenario 3 — Key Reuse Attempt

Outcome: Decryption fails (nonce & auth tag mismatch).

Scenario 4 — Traffic Correlation

Outcome: Attacker infers timing relationships. Mitigation: Use Tor; randomize TTLs; stagger sends.

Outcome: User enters fake Nyxen URL. Mitigation: Always verify .vip or .onion domain and TLS certificate.


9. Security Checklist for Users

Category
Best Practice

Keys

Never share via untrusted channels. Split keys if possible.

Devices

Keep OS updated; use trusted hardware.

Network

Use VPN or Tor for added anonymity.

Storage

Don’t export Nyxen data. Treat local files as sensitive.

Verification

Always confirm domain before sharing.

TTL Discipline

Set shorter TTLs than you think you need.

[!TIP] Paranoia is a feature, not a flaw.


Nyxen is a privacy infrastructure, not a censorship-avoidance or data-hiding tool. It is designed for legal, ethical use by professionals requiring ephemeral, encrypted collaboration.

Examples of legitimate uses:

  • Security and incident response teams

  • Legal firms working on sensitive mergers

  • Journalists protecting sources

  • Product teams handling unreleased IP

  • NGO or field operations requiring transient comms

[!WARNING] Nyxen prohibits and monitors for abuse indicators at the network level (volume, pattern anomalies) — not content. Malicious use results in access termination.


11. Summary

Nyxen provides strong privacy and cryptographic assurance, not perfect anonymity.

Guarantee
Status

Encryption

End-to-end, enforced

Data retention

None

Logs

None after TTL

Trust requirement

Minimal

Endpoint security

User responsibility

Operational discipline

Required


12. The Ethos

Nyxen’s defense philosophy:

If it doesn’t exist, it can’t be compromised.

Everything else is just implementation detail.

Last updated