NovaKey is designed to transmit high-value secrets from an iOS device to a trusted local listener without exposing those secrets to keyboards, logs, analytics, or cloud services.
This document defines NovaKeyโs threat model, cryptographic design, test-backed guarantees, and privacy posture.
NovaKey uses the STRIDE framework to systematically identify and mitigate threats.
| Threat | Description | Mitigation | Residual Risk |
|---|---|---|---|
| Spoofing | Fake listener impersonation | Pairing QR + host:port binding | User pairs malicious host |
| Tampering | Message modification | AEAD (XChaCha20-Poly1305) | Compromised OS |
| Repudiation | User denies sending | Explicit UI + biometrics | Social dispute |
| Info Disclosure | Secret leakage | Keychain + redacted logs | OS compromise |
| DoS | Blocked sending | Timeouts + retries | Network failure |
| Privilege Escalation | Unauthorized send | Biometric + approval gates | Trusted daemon misbehavior |
- iOS Secure Enclave & Keychain
- Explicit user actions
- Paired listener after verification
- Network
- Clipboard after timeout
- Remote endpoints
- Background processes
NovaKey fails closed across all trust boundaries. NovaKey does not rely on the secrecy of its source code. All security-relevant behavior is open, explicit, and reviewable.
| Purpose | Primitive |
|---|---|
| Key exchange | ML-KEM-768 |
| Encryption | XChaCha20-Poly1305 |
| Authentication | Per-device symmetric keys |
| Replay protection | Nonces + timestamps |
NovaKey does not invent cryptography.
- Secrets are never stored in plaintext
- All secrets reside in iOS Keychain
- Secrets are never logged or uploaded
- Clipboard use is explicit, local-only, and time-limited
Every security property is enforced by automated tests.
| Claim | Tests |
|---|---|
| Secrets require biometrics | VaultAuthTests |
| Pairing mismatch rejected | PairingManagerTests |
| Replay rejected | ProtocolReplayTests |
| Clipboard auto-clear | ClipboardManagerTests |
.okClipboard treated as success |
ClientStatusTests |
NovaKey:
- โ Collects no personal data
- โ Uses no analytics
- โ Performs no tracking
- โ Uploads no secrets
All data is stored locally on the device.
๐ง [email protected]
๐ My PGP Key https://downloads.osbornepro.com/publickey.asc
๐ Encrypted reports welcome
๐ซ Do not disclose vulnerabilities publicly
- Protection from compromised OS
- Protection from malicious paired listener
- Anonymity
- Forward secrecy beyond protocol design
Security is explicit, intentional, and user-controlled.