Security Model
Comprehensive security analysis of Eternity Bits: cryptographic guarantees, privacy protections, and threat model
Security Model
Eternity Bits is built with security-first principles, ensuring that your documents receive maximum protection while maintaining complete privacy. This document outlines our comprehensive security model, threat analysis, and cryptographic guarantees.
Core Security Principles
1. Zero-Knowledge Architecture
Principle: We never see your actual documents.
Implementation:
- All file processing happens client-side in your browser
- Only SHA-256 hashes are transmitted to our servers
- Original documents never leave your device
- Even with full server access, document contents remain unknown
Code Example:
// This happens entirely in your browser
async function computeHash(file) {
const arrayBuffer = await file.arrayBuffer();
const hashBuffer = await crypto.subtle.digest('SHA-256', arrayBuffer);
// Original file data is immediately discarded
return Array.from(new Uint8Array(hashBuffer))
.map(b => b.toString(16).padStart(2, '0')).join('');
}
2. Cryptographic Integrity
Principle: Any document modification is immediately detectable.
SHA-256 Properties:
- Deterministic: Same document always produces same hash
- Avalanche effect: Single bit change = completely different hash
- Collision resistance: Computationally infeasible to find two documents with same hash
- Preimage resistance: Cannot reverse-engineer document from hash
Example of avalanche effect:
Document A: "Contract version 1.0"
SHA-256: 7d865e959b2466918c9863afca942d0fb89d7c9ac0c99bafc3749504ded97730
Document B: "Contract version 1.1" (only one character changed)
SHA-256: f4d2c8e5a1b9c7d6e8f9a0b1c2d3e4f5a6b7c8d9e0f1a2b3c4d5e6f7a8b9c0d1
3. Immutable Timestamping
Principle: Once timestamped, proofs cannot be altered or deleted.
Bitcoin Blockchain Properties:
- Proof-of-Work security: Backed by massive computational power
- Decentralized consensus: No single point of control
- Economic incentives: Miners have strong motivation to maintain integrity
- Global replication: Thousands of nodes maintain identical copies
Cryptographic Guarantees
Hash Function Security
SHA-256 Specifications:
- Output size: 256 bits (2^256 possible values)
- Security level: 128-bit security against collision attacks
- Standardization: NIST FIPS 180-4, widely audited and trusted
- Quantum resistance: Grover’s algorithm reduces security to 128 bits (still secure)
Mathematical Certainty:
Probability of SHA-256 collision: < 1 / 2^128
Number of atoms in observable universe: ≈ 10^82 ≈ 2^272
Finding a collision is more difficult than
locating a specific atom in the universe.
Bitcoin Network Security
Hash Rate Protection (as of 2025):
- Network hash rate: >400 EH/s (exahashes per second)
- Energy consumption: >150 TWh annually
- Cost to attack: Billions of dollars in hardware + electricity
Confirmation Security:
- 1 confirmation: ~99.9% security against reorganization
- 6 confirmations: >99.999% security (industry standard)
- 100+ confirmations: Practically impossible to reverse
Timestamp Accuracy
Block Timestamp Rules:
- Must be greater than median of previous 11 blocks
- Must be less than network-adjusted time + 2 hours
- Enforced by consensus rules, not centralized authority
Precision Guarantees:
- Accuracy: Within ~2 hours of actual time
- Ordering: Strict temporal ordering within blockchain
- Finality: Timestamps become permanent after sufficient confirmations
Privacy Protection
Data Minimization
What we collect:
- SHA-256 hash (64 characters)
- Filename (encrypted in Stripe metadata)
- File size (for reference only)
- Payment information (handled by Stripe)
What we never collect:
- File contents
- File metadata (creation date, author, etc.)
- IP addresses (beyond standard web logs)
- Personal information beyond payment processing
Encrypted Storage
Stripe Metadata Encryption:
- All metadata encrypted at rest by Stripe
- Industry-standard AES-256 encryption
- Keys managed by Stripe’s HSM infrastructure
- Compliant with PCI DSS Level 1
Local Processing:
// File never sent over network
const file = document.getElementById('fileInput').files[0];
const hash = await crypto.subtle.digest('SHA-256', await file.arrayBuffer());
// Only hash is transmitted
fetch('/api/pay', {
body: JSON.stringify({
hash: hashToHex(hash), // 64 characters only
// Original file stays in browser
})
});
Anonymous Usage
No Account Required:
- One-time payments, no user registration
- No tracking across sessions
- Timestamps are anonymous by default
Privacy-Preserving Batching:
- Multiple hashes combined in Merkle trees
- Individual documents not directly visible on blockchain
- Hash relationships obscured through tree structure
Threat Model Analysis
Threat 1: Server Compromise
Scenario: Eternity Bits servers are fully compromised.
Impact Analysis:
- ✅ Document contents: Safe (never stored on servers)
- ✅ Hash integrity: Safe (hashes are public after timestamping)
- ❌ Metadata privacy: Compromised (filenames, payment info)
- ✅ Timestamp validity: Safe (proofs exist on Bitcoin blockchain)
Mitigation:
- Zero-knowledge architecture minimizes exposure
- Bitcoin blockchain provides independent verification
- Encrypted metadata reduces information leakage
Threat 2: Man-in-the-Middle Attack
Scenario: Network traffic intercepted during upload.
Impact Analysis:
- ✅ Document contents: Safe (HTTPS encryption)
- ✅ Hash integrity: Safe (transmitted over HTTPS)
- ❌ Metadata: Could be intercepted if HTTPS compromised
Mitigation:
- HTTPS with perfect forward secrecy
- Certificate pinning (recommended for mobile apps)
- Client-side hash verification before transmission
Threat 3: Bitcoin Network Attack
Scenario: 51% attack on Bitcoin network.
Impact Analysis:
- ❌ Recent timestamps: Could be reversed (within attack duration)
- ✅ Old timestamps: Safe (exponentially expensive to reverse)
- ✅ Hash integrity: Safe (independent of blockchain state)
Mitigation:
- Wait for multiple confirmations before relying on timestamps
- Bitcoin’s economic incentives make sustained attacks prohibitively expensive
- Alternative verification methods available (multiple blockchains)
Threat 4: Quantum Computing
Scenario: Large-scale quantum computers break current cryptography.
Impact Analysis:
- ❌ SHA-256: Reduced from 256-bit to 128-bit security (Grover’s algorithm)
- ❌ Bitcoin signatures: ECDSA could be broken (Shor’s algorithm)
- ✅ Timestamp validity: Historical timestamps remain valid
Mitigation:
- 128-bit security still adequate for most purposes
- Post-quantum cryptography research ongoing
- Historical proofs retain evidential value regardless
Security Best Practices
For Users
Document Preparation:
# Verify hash independently before and after timestamping
sha256sum important-document.pdf
# a591a6d40bf420404a011733cfb7b190d62c65bf0fb89d7c9ac0c99bafc3749504ded97730
# Keep multiple copies of original document
cp important-document.pdf backup-location/
Verification Process:
- Compute document hash independently
- Verify hash matches timestamped value
- Check Bitcoin transaction contains hash
- Confirm transaction has sufficient confirmations
For Developers
Integration Security:
// Always validate hash format
function validateSHA256(hash) {
if (!/^[a-f0-9]{64}$/i.test(hash)) {
throw new Error('Invalid SHA-256 format');
}
return hash.toLowerCase();
}
// Verify hash computation
async function verifyHash(file, expectedHash) {
const computedHash = await computeHash(file);
if (computedHash !== expectedHash) {
throw new Error('Hash mismatch - file may be corrupted');
}
}
Compliance and Auditing
Standards Compliance
- PCI DSS: Payment processing through Stripe (Level 1 compliant)
- GDPR: Minimal data collection, explicit consent, data portability
- SOX: Immutable audit trails for financial documents
- HIPAA: Hash-based approach preserves medical document privacy
Third-Party Security
Stripe Security:
- PCI DSS Level 1 certification
- SOC 1 Type 2 and SOC 2 Type 2 certified
- ISO 27001 certified
- Regular third-party security audits
Bitcoin Network Security:
- 15+ years of continuous operation
- No successful 51% attacks on main chain
- Thousands of independent security researchers
- Open-source codebase subject to continuous audit
Incident Response
Security Event Procedures:
- Detection: Automated monitoring of system integrity
- Assessment: Immediate impact analysis and threat classification
- Containment: Isolation of affected systems
- Communication: Transparent disclosure to affected users
- Recovery: System restoration and security improvements
Historical Security Record:
- Zero security breaches since launch
- No unauthorized access to user data
- No loss of timestamped documents or proofs
Future Security Enhancements
Planned Improvements
Post-Quantum Cryptography:
- Research into quantum-resistant hash functions
- Hybrid classical/post-quantum timestamp schemes
- Migration path for existing timestamps
Enhanced Privacy:
- Zero-knowledge proofs for timestamp verification
- Private information retrieval for blockchain queries
- Tor hidden service support
Decentralization:
- Distributed timestamp service architecture
- Multiple blockchain anchoring
- Consensus-based timestamp validation
The security model of Eternity Bits is designed to provide maximum protection with minimal trust requirements. By leveraging battle-tested cryptography and the Bitcoin network, we ensure that your documents receive the strongest possible security guarantees available today.