lockPrivacy & Security

Privacy isn’t optional—it’s foundational.

Whisper is built as a private coordination protocol for Web3, where wallets are identities and chat is the execution layer. Privacy is not a setting, a policy, or a promise. It is enforced by protocol design.

Most communication systems leak structure, metadata, and intent. Whisper is designed for adversarial environments, where coordination, value transfer, and authorization must remain private even when networks are observed.

This section explains how Whisper protects communication, the security assumptions it makes, the threat model it addresses, and the controls users retain.

1. Core Privacy Principles

Whisper is built around four core privacy principles.

End to End Encryption by Default Messages are encrypted at the client and can only be decrypted by the intended recipient. No intermediary can access message content.

Zero Trust by Design All infrastructure is treated as untrusted. Privacy does not depend on honest servers, compliant operators, or policy enforcement.

Wallet Bound Identity Identity is derived directly from wallet ownership. There are no usernames, emails, phone numbers, or centralized identity providers.

Minimal Metadata Exposure Whisper avoids presence signals and persistent identifiers. There is no last seen, typing indicator, read receipt, or public social graph.

2. How Whisper Protects Messages

Client Side Encryption Messages are encrypted before leaving the sender’s device and decrypted only by the recipient.

Asymmetric Cryptography Each user relies on cryptographic keys derived from their wallet. Messages are encrypted using the recipient’s public key and verified on receipt.

XMTP Transport Layer Messages are transmitted off chain using XMTP. Relayers forward encrypted payloads without access to content or intent.

No Key Escrow Private keys never leave the user’s wallet environment. There is no centralized key storage or recovery mechanism.

Ephemeral Conversations Chats do not rely on global sessions. Each conversation operates independently.

3. Identity and Authentication

Wallet Based Authentication Users authenticate by signing messages with their wallet. There are no passwords to reset and no accounts to recover.

Direct Identity Binding Each message is cryptographically tied to a wallet address. ENS names may be used for readability, but they do not create profiles or public identities.

Communication proves control, not reputation.

4. Zero Trust Execution Model

Whisper assumes that networks, relayers, and infrastructure may be monitored or compromised.

  • Messages remain encrypted at every hop

  • Actions require explicit wallet signatures

  • No backend can initiate, alter, or approve actions

Execution only occurs with direct user consent.

5. Metadata and Privacy Preservation

Whisper is designed to reduce metadata leakage.

  • No presence indicators

  • No public follower graph

  • No behavioral analytics

  • No message indexing by identity

Relayers handle encrypted data without visibility into relationships, timing patterns, or intent.

6. Group Communication and Access Control

Whisper supports private coordination among defined counterparties.

Access can be restricted using wallet ownership or cryptographic conditions. Enforcement happens through signatures and message acceptance rules, not centralized moderation systems.

There are no global groups and no discoverable rooms.

7. User Controls and Security Hygiene

Users retain full control over communication and execution.

  • Messages require explicit acceptance

  • Transfers and swaps require wallet approval

  • Conversations can be ephemeral by default

  • Identity access follows wallet control

Loss of wallet access means loss of communication access. There are no recovery backdoors.

8. Threat Model and Mitigations

Whisper is designed for hostile environments. The table below outlines the main threat vectors and how the protocol mitigates them.

Threat Vector
Risk Description
Whisper Mitigation

Network Surveillance

Traffic is observed to infer communication patterns

End to end encryption and off chain relayed delivery

Infrastructure Compromise

Relayers or nodes are breached

Relayers handle encrypted payloads only

Metadata Correlation

Timing or presence signals reveal relationships

No presence indicators or public social graph

Identity Seizure

Accounts are taken over or censored

No accounts exist, identity is wallet based

Message Tampering

Messages altered in transit

Cryptographic authentication and verification

Unauthorized Execution

Actions triggered without consent

All actions require wallet signatures

Onchain Linkability

Payments reveal wallet history

Stealth addresses and relayed settlement

Censorship

Messages blocked by a central operator

No central server or authority

Whisper’s security properties hold even if infrastructure behaves maliciously.

9. Limitations and User Responsibility

Whisper protects communication at the protocol level, but some risks remain.

  • Once decrypted, messages exist on the user’s device

  • Physical access to a device can expose messages

  • Wallet compromise exposes identity and actions

Users are responsible for securing wallets and devices.

10. Transparency and Governance

Whisper commits to transparency at the protocol level.

  • Publicly auditable code

  • External security reviews as the protocol matures

  • Governance driven upgrades and treasury decisions

Trust is earned through verification.

11. Future Privacy Enhancements

Planned improvements include:

  • Stronger metadata obfuscation

  • Selective disclosure using cryptographic proofs

  • Privacy preserving local tooling

All additions will preserve existing guarantees.

Summary

Whisper replaces fragile communication systems with a private coordination layer built around wallets, signatures, and encrypted execution.

There are no accounts to seize, no servers to trust, and no social graphs to expose.

Communication becomes something you control, authorize, and execute directly.

Last updated