Skip to main content

Security Notes

Product Security Position

WHOT uses moderated encrypted chat. It must not be marketed or documented as end-to-end encrypted because authorized staff can review retained content under controlled workflows.

Protected Assets

  • Credentials and JWTs
  • Invite tokens
  • Message encryption keys
  • Retained moderation archives
  • Audit logs

Threats and Controls

ThreatControl
Invite guessing or replayHigh-entropy tokens, single-use redemption, expiry
Username confusionCase-sensitive uniqueness and explicit user IDs
Unauthorized moderationRole checks, reason capture, audit trails
Message disclosureEnvelope encryption, redacted logs, retention limits
WebSocket hijackingJWT validation, origin checks, reconnect tokens, rate limiting

Retention and Privacy

Data typeDefault
Participant-facing messagesRemoved after both participants read them
Retained archive copies30 days
Legal holdExplicit override with audit trail
Auth and security logs90 days

Security Handover Notes

  • Keep privileged access explicit and auditable.
  • Keep production secrets out of source control and development fallbacks disabled in production.
  • Preserve the wording distinction between encrypted chat and end-to-end encryption in product, policy, and App Store materials.