Security Updated 1/29/2025

Security Model

Comprehensive security analysis of Eternity Bits: cryptographic guarantees, privacy protections, and threat model

Security Model

Eternity Bits is built with security-first principles, ensuring that your documents receive maximum protection while maintaining complete privacy. This document outlines our comprehensive security model, threat analysis, and cryptographic guarantees.

Core Security Principles

1. Zero-Knowledge Architecture

Principle: We never see your actual documents.

Implementation:

  • All file processing happens client-side in your browser
  • Only SHA-256 hashes are transmitted to our servers
  • Original documents never leave your device
  • Even with full server access, document contents remain unknown

Code Example:

// This happens entirely in your browser
async function computeHash(file) {
  const arrayBuffer = await file.arrayBuffer();
  const hashBuffer = await crypto.subtle.digest('SHA-256', arrayBuffer);
  // Original file data is immediately discarded
  return Array.from(new Uint8Array(hashBuffer))
    .map(b => b.toString(16).padStart(2, '0')).join('');
}

2. Cryptographic Integrity

Principle: Any document modification is immediately detectable.

SHA-256 Properties:

  • Deterministic: Same document always produces same hash
  • Avalanche effect: Single bit change = completely different hash
  • Collision resistance: Computationally infeasible to find two documents with same hash
  • Preimage resistance: Cannot reverse-engineer document from hash

Example of avalanche effect:

Document A: "Contract version 1.0"
SHA-256:    7d865e959b2466918c9863afca942d0fb89d7c9ac0c99bafc3749504ded97730

Document B: "Contract version 1.1"  (only one character changed)
SHA-256:    f4d2c8e5a1b9c7d6e8f9a0b1c2d3e4f5a6b7c8d9e0f1a2b3c4d5e6f7a8b9c0d1

3. Immutable Timestamping

Principle: Once timestamped, proofs cannot be altered or deleted.

Bitcoin Blockchain Properties:

  • Proof-of-Work security: Backed by massive computational power
  • Decentralized consensus: No single point of control
  • Economic incentives: Miners have strong motivation to maintain integrity
  • Global replication: Thousands of nodes maintain identical copies

Cryptographic Guarantees

Hash Function Security

SHA-256 Specifications:

  • Output size: 256 bits (2^256 possible values)
  • Security level: 128-bit security against collision attacks
  • Standardization: NIST FIPS 180-4, widely audited and trusted
  • Quantum resistance: Grover’s algorithm reduces security to 128 bits (still secure)

Mathematical Certainty:

Probability of SHA-256 collision: < 1 / 2^128
Number of atoms in observable universe: ≈ 10^82 ≈ 2^272

Finding a collision is more difficult than 
locating a specific atom in the universe.

Bitcoin Network Security

Hash Rate Protection (as of 2025):

  • Network hash rate: >400 EH/s (exahashes per second)
  • Energy consumption: >150 TWh annually
  • Cost to attack: Billions of dollars in hardware + electricity

Confirmation Security:

  • 1 confirmation: ~99.9% security against reorganization
  • 6 confirmations: >99.999% security (industry standard)
  • 100+ confirmations: Practically impossible to reverse

Timestamp Accuracy

Block Timestamp Rules:

  • Must be greater than median of previous 11 blocks
  • Must be less than network-adjusted time + 2 hours
  • Enforced by consensus rules, not centralized authority

Precision Guarantees:

  • Accuracy: Within ~2 hours of actual time
  • Ordering: Strict temporal ordering within blockchain
  • Finality: Timestamps become permanent after sufficient confirmations

Privacy Protection

Data Minimization

What we collect:

  • SHA-256 hash (64 characters)
  • Filename (encrypted in Stripe metadata)
  • File size (for reference only)
  • Payment information (handled by Stripe)

What we never collect:

  • File contents
  • File metadata (creation date, author, etc.)
  • IP addresses (beyond standard web logs)
  • Personal information beyond payment processing

Encrypted Storage

Stripe Metadata Encryption:

  • All metadata encrypted at rest by Stripe
  • Industry-standard AES-256 encryption
  • Keys managed by Stripe’s HSM infrastructure
  • Compliant with PCI DSS Level 1

Local Processing:

// File never sent over network
const file = document.getElementById('fileInput').files[0];
const hash = await crypto.subtle.digest('SHA-256', await file.arrayBuffer());

// Only hash is transmitted
fetch('/api/pay', {
  body: JSON.stringify({ 
    hash: hashToHex(hash), // 64 characters only
    // Original file stays in browser
  })
});

Anonymous Usage

No Account Required:

  • One-time payments, no user registration
  • No tracking across sessions
  • Timestamps are anonymous by default

Privacy-Preserving Batching:

  • Multiple hashes combined in Merkle trees
  • Individual documents not directly visible on blockchain
  • Hash relationships obscured through tree structure

Threat Model Analysis

Threat 1: Server Compromise

Scenario: Eternity Bits servers are fully compromised.

Impact Analysis:

  • Document contents: Safe (never stored on servers)
  • Hash integrity: Safe (hashes are public after timestamping)
  • Metadata privacy: Compromised (filenames, payment info)
  • Timestamp validity: Safe (proofs exist on Bitcoin blockchain)

Mitigation:

  • Zero-knowledge architecture minimizes exposure
  • Bitcoin blockchain provides independent verification
  • Encrypted metadata reduces information leakage

Threat 2: Man-in-the-Middle Attack

Scenario: Network traffic intercepted during upload.

Impact Analysis:

  • Document contents: Safe (HTTPS encryption)
  • Hash integrity: Safe (transmitted over HTTPS)
  • Metadata: Could be intercepted if HTTPS compromised

Mitigation:

  • HTTPS with perfect forward secrecy
  • Certificate pinning (recommended for mobile apps)
  • Client-side hash verification before transmission

Threat 3: Bitcoin Network Attack

Scenario: 51% attack on Bitcoin network.

Impact Analysis:

  • Recent timestamps: Could be reversed (within attack duration)
  • Old timestamps: Safe (exponentially expensive to reverse)
  • Hash integrity: Safe (independent of blockchain state)

Mitigation:

  • Wait for multiple confirmations before relying on timestamps
  • Bitcoin’s economic incentives make sustained attacks prohibitively expensive
  • Alternative verification methods available (multiple blockchains)

Threat 4: Quantum Computing

Scenario: Large-scale quantum computers break current cryptography.

Impact Analysis:

  • SHA-256: Reduced from 256-bit to 128-bit security (Grover’s algorithm)
  • Bitcoin signatures: ECDSA could be broken (Shor’s algorithm)
  • Timestamp validity: Historical timestamps remain valid

Mitigation:

  • 128-bit security still adequate for most purposes
  • Post-quantum cryptography research ongoing
  • Historical proofs retain evidential value regardless

Security Best Practices

For Users

Document Preparation:

# Verify hash independently before and after timestamping
sha256sum important-document.pdf
# a591a6d40bf420404a011733cfb7b190d62c65bf0fb89d7c9ac0c99bafc3749504ded97730

# Keep multiple copies of original document
cp important-document.pdf backup-location/

Verification Process:

  1. Compute document hash independently
  2. Verify hash matches timestamped value
  3. Check Bitcoin transaction contains hash
  4. Confirm transaction has sufficient confirmations

For Developers

Integration Security:

// Always validate hash format
function validateSHA256(hash) {
  if (!/^[a-f0-9]{64}$/i.test(hash)) {
    throw new Error('Invalid SHA-256 format');
  }
  return hash.toLowerCase();
}

// Verify hash computation
async function verifyHash(file, expectedHash) {
  const computedHash = await computeHash(file);
  if (computedHash !== expectedHash) {
    throw new Error('Hash mismatch - file may be corrupted');
  }
}

Compliance and Auditing

Standards Compliance

  • PCI DSS: Payment processing through Stripe (Level 1 compliant)
  • GDPR: Minimal data collection, explicit consent, data portability
  • SOX: Immutable audit trails for financial documents
  • HIPAA: Hash-based approach preserves medical document privacy

Third-Party Security

Stripe Security:

  • PCI DSS Level 1 certification
  • SOC 1 Type 2 and SOC 2 Type 2 certified
  • ISO 27001 certified
  • Regular third-party security audits

Bitcoin Network Security:

  • 15+ years of continuous operation
  • No successful 51% attacks on main chain
  • Thousands of independent security researchers
  • Open-source codebase subject to continuous audit

Incident Response

Security Event Procedures:

  1. Detection: Automated monitoring of system integrity
  2. Assessment: Immediate impact analysis and threat classification
  3. Containment: Isolation of affected systems
  4. Communication: Transparent disclosure to affected users
  5. Recovery: System restoration and security improvements

Historical Security Record:

  • Zero security breaches since launch
  • No unauthorized access to user data
  • No loss of timestamped documents or proofs

Future Security Enhancements

Planned Improvements

Post-Quantum Cryptography:

  • Research into quantum-resistant hash functions
  • Hybrid classical/post-quantum timestamp schemes
  • Migration path for existing timestamps

Enhanced Privacy:

  • Zero-knowledge proofs for timestamp verification
  • Private information retrieval for blockchain queries
  • Tor hidden service support

Decentralization:

  • Distributed timestamp service architecture
  • Multiple blockchain anchoring
  • Consensus-based timestamp validation

The security model of Eternity Bits is designed to provide maximum protection with minimal trust requirements. By leveraging battle-tested cryptography and the Bitcoin network, we ensure that your documents receive the strongest possible security guarantees available today.

Ready to Start Timestamping?

Create permanent Bitcoin timestamps for your documents

Get Started →