Time-Check

Security Architecture

Overview

Time-Check implements enterprise-grade security with a zero-knowledge architecture that ensures complete privacy and anonymity while enabling cross-organizational availability sharing.

Core Security Principles

1. Zero-Knowledge Architecture

2. Anonymous by Design

3. Local Processing Only

Encryption Implementation

Cryptographic Algorithms

Key Management

Encryption Process

1. Generate ephemeral key pair (Client)
2. Exchange public keys (Anonymous)
3. Derive shared secret (ECDH)
4. Encrypt availability data (XSalsa20 + Poly1305)
5. Transmit encrypted data only
6. Decrypt on requestor device
7. Discard all keys

Data Protection

Information Minimization

Data Lifecycle

  1. Collection: Availability extracted locally from calendar
  2. Processing: Converted to encrypted bitmap on device
  3. Transmission: Only encrypted data sent to server
  4. Storage: Temporary encrypted storage (max 30 days)
  5. Retrieval: Encrypted data retrieved by requestor
  6. Deletion: Automatic expiration and cleanup

No Persistent Storage

Anonymous Identity System

Email-Based Verification

Device Identity

Request Anonymity

Network Security

Transport Layer Security

API Security

Infrastructure Security

Compliance and Standards

Privacy Regulations

Security Standards

Industry Standards

Threat Model

Protected Against

Attack Scenarios

Security Assumptions

Security Monitoring

Threat Detection

Incident Response


Next Steps: Learn about how it works or download the iOS app.