Military-Grade Security

Security Architecture

Built with post-quantum cryptography and distributed secret sharing. Every layer designed to protect you.

Cryptographic Stack

Military-grade cryptography protecting every transaction

Signatures
ECDSA
secp256k1
Secret Sharing
Shamir 7-of-10
Information-Theoretic
Encryption
ChaCha20
Poly1305
Key Derivation
Argon2id
64MB Memory
Anti-Manipulation

MEV Resistance

4 layers preventing front-running and manipulation

1

Commit-Reveal

Hide until included

2

VRF Anchor

Random leader selection

3

Threshold Encrypt

No single view

4

Random Ordering

No front-running

Protection Matrix

Comprehensive defense against all attack vectors

Eavesdropping
Man-in-the-Middle
Replay Attacks
Tampering
Quantum Threats
Shamir
Front-Running (MEV)
Message Security

Shamir Secret Sharing (7-of-10)

Every message is split into 10 shares. You need 7 to reconstruct — 6 or fewer reveal nothing.

  • No single point of compromise
  • Attackers must control 7+ nodes
  • Information-theoretic security
Your message becomes
10 shares
1
2
3
4
5
6
7
8
9
10
Need 7 to decrypt
3 can be offline or compromised

Threat Model

Single node compromise
Attacker gets 1 share (useless without 6 more)
Network eavesdropping
ChaCha20-Poly1305 encryption + Shamir shares
Server subpoena
No central server exists to subpoena
Company shutdown
Network runs on independent nodes
Quantum computers
Shamir provides information-theoretic security
Honest Limitations

What We Don't Protect Against

No security system is perfect. Be aware of these limitations.

Compromised devices
Malware on your device can read messages after decryption
Screenshots/forwarding
Recipients can always screenshot or forward
Metadata (partial)
The fact you use AXIOM is visible to your network
Social engineering
Humans remain the weakest link

Technical Specifications

Message EncryptionChaCha20-Poly1305 + Shamir
Secret SharingShamir's scheme, k=7, n=10
Security ModelInformation-theoretic (k-1 shares = zero info)
SignaturesECDSA (secp256k1)
HashingSHA3-256 (Keccak)
Key DerivationArgon2id (64MB, 3 iterations)
ImplementationRust (memory-safe)

For complete technical details, see our Whitepaper.

100% Open Source

All AXIOM code is open source and available for inspection. Don't trust us — verify.

View on GitHub

Experience it yourself

Download AXIOM and see secure messaging in action.

Download for Windows