Transparent Protocol
How each tool protects your privacy
IronClad does not collect your data. Full stop.
End-to-end encrypted messaging system, resistant to quantum computers. We can never read your messages.
Channel Creation
- 1. Your browser generates an ML-KEM-768 key pair
- 2. The public key is sent to the server
- 3. The server generates a unique 20-character identifier
- 4. Your browser derives the channel key via HKDF
- 5. Only the unreadable encrypted version is stored on our servers
Automatic Expiration
- Messages: Expire based on your setting (24h, 48h, or 7 days)
- Channels: Automatically deleted after 30 days of inactivity
A safety system that protects you if you become unreachable. Think of it as a digital testament that automatically activates if you don't log in for a configured period.
Activation Conditions
- 1. Be logged into your account
- 2. Set an expiration delay (7, 14, 30, 60, or 90 days)
- 3. Enable two-factor authentication (2FA)
A one-time encrypted message transmission system. After reading, the message is destroyed. No trace is preserved.
- Write message - Choose lifetime (1h, 24h, 7d)
- Generate unique link with encrypted message
- After temporal expiration or last read - Immediate deletion
- Encryption: AES-256-GCM with URL fragment key transmission
Analyzes URLs and files to detect potential threats using the VirusTotal API.
What is sent to VirusTotal: URL/file, IP address (by VT), timestamp, user-agent.
What we don't store: Original URL (hashed), full results (cached max 24h), your IP, scan history.
100% of tests run locally in your browser. No data is sent to our servers.
- WebRTC Test - Detects if your real IP is exposed
- DNS Leak Test - Verifies if DNS requests go through VPN/proxy
- Tor Detection - Identifies Tor network usage
- WebRTC ICE Test - Analyzes candidate types
Generates cryptographically secure keys resistant to quantum computer attacks.
Algorithms
- ML-KEM-768: Key Encapsulation (NIST FIPS 203)
- ML-DSA-65: Digital signature (NIST FIPS 204)
Generation Security: Uses crypto.getRandomValues() (CSPRNG, 256 bits minimum entropy)
Generates completely fictional identities to protect your online privacy.
What's Generated
- Fictional name, email, phone number
- Physical address, date of birth (random, adult)
- SSN equivalent (fictional)
Use Cases: Pseudonymization, testing, secure source communication
Creates cryptographically secure passwords 100% locally in your browser.
Security
- Source: crypto.getRandomValues() (CSPRNG)
- Entropy: 256 bits minimum
- 24-char password: ~157 bits entropy
Recommendation: Use a password manager, never reuse passwords
Questions? Contact us via Secure Channel