Making Data Unrecoverable

While end-to-end encryption effectively protects your messages from being read by third parties during transmission, it's crucial to consider the risks posed by physical access to your machine.

If an adversary gets their hands on your actual machine, there's a significant chance they will be able to recover even deleted (or self-destructed) messages by analyzing the contents of your hard drives or RAM memory.

Cradle assumes the worst-case scenario of your machine being captured in an unencrypted state and takes every possible measure to minimize potential damage.

service_icon1

RAM Memory Wipe

When Cradle is closed, it securely overwrites the allocated RAM memory with zeroes or random data.

service_icon2

End-to-end Encrypted

State-of-the-art E2E encryption powered by the open source Signal Protocol.


service_icon3

No Mobile Device Required

Register on your desktop to mitigate risks associated with mobile phone usage.


service_icon4

Steganography

Conceal secret data within innocent-looking images, audio files, text, and network packets.

This feature will be available for both locally stored application data and user-to-user communication.


service_icon5

Secure Erase
(coming soon)

Overwrite the hard drive sectors containing application data to prevent deleted / self-destructed messages from being recovered.


WARNING: Overwriting the sectors on SSD drives may not work as intended due to wear leveling (read more). It is recommended to use different options instead.

service_icon6

RAM-Only Mode
(coming soon)

Load Cradle directly into RAM.

Operating in this mode ensures no data is written to the hard drive.


Upon session closure, all exchanged message data will be permanently gone.


Timeline

Meet Our Team

At Cradle, we're not just a team. We're a family of data security enthusiasts on a mission.

Together, we combine our expertise in cryptography, software development, and cybersecurity to create a solution for safeguarding your digital world.

team1

Paweł Śmiałek

Full-Stack Development

Paweł Śmiałek

Full-Stack Development
team2

Elizaveta Shevchenko

Security Research

Elizaveta Shevchenko

Security Research
team3

Wiktor Kudła

Project Lead

Wiktor Kudła

Project Lead

Guides

Contact Us

Contact Us
Follow Us