Security is at the core of Stork SMS. Our multi-layered security architecture ensures that your conversations remain private and accessible only to authorized participants.
Core Security Principles
1. Zero-Knowledge Architecture
- We never see your unencrypted messages
- No access to private keys
- Minimal metadata collection
- Client-side encryption/decryption
2. Blockchain-Based Access Control
- NFT ownership determines chat access
- Immutable permission system
- No backdoors or admin overrides
- Transparent verification on-chain
3. End-to-End Encryption
- AES-256-GCM encryption
- Keys derived from participant wallets
- Forward secrecy (planned)
- No key escrow
Security Sections
Wallet-Based Authentication
Learn how we use cryptographic signatures for passwordless authentication.NFT-Based Access Control
Understand how NFTs serve as unbreakable access tokens for conversations.End-to-End Encryption
Explore our encryption implementation and key management.Security Measures
Review our comprehensive security implementations and best practices.Privacy Features
Discover how we protect your privacy and minimize data collection.Quick Security Facts
- No Passwords: Authentication via wallet signatures
- No Phone Numbers: Only wallet addresses used
- No Central Database: Messages encrypted before storage
- No Admin Access: Even we can’t read your messages
- Open Source: Security through transparency (GitHub)
Security Guarantees
What We Protect
✅ Message content (end-to-end encrypted) ✅ Chat access (NFT-gated) ✅ User identity (pseudonymous) ✅ Transaction integrity (blockchain-verified)What We Don’t Store
❌ Unencrypted messages ❌ Private keys ❌ Personal information ❌ IP addresses (beyond rate limiting) ❌ Device fingerprintsReporting Security Issues
Found a vulnerability? Please report it to:- Email: info@stork-sms.net
- Bug Bounty: Coming soon
