Releases: SecretML/SecretMemoryLocker
SecretML v4.05
SecretMemoryLocker v4.05
What's New in v4.05 — TIMELOCK v1 (PSQC Chronos Protocol)
⏳ TIMELOCK v1 (Chronos Protocol) — Nonce-Based Cryptographic Time Delay
🔐 SecretMemoryLocker v4.05 introduces TIMELOCK v1, an experimental time-delay mechanism for PSQC (Phantom-Step Cascade Container).
This feature turns a randomly generated nonce into a computational time source, creating a cryptographic time capsule effect.
Instead of storing the real nonce, the PSQC container stores only its hash:
PSQC:{
"nonce_hint": "LEdWTvvka9******",
"nonce_hash_V1": "48d49beb8cbb82c65d1009fbcbc22c70c1a3dad87a7558b932dfb97ec4f3b928",
"ciphertext": "Argon2id(secret = nonce, salt = file_hash → Layer0 : base64_payload_data..."
}
To unlock the container, the system must discover the nonce such that:
SHA256(nonce) == nonce_hash_V1
Once the correct nonce is found, it becomes the secret input for key derivation:
Layer0 → Argon2 → decrypt
↓
Layer1 → Argon2 → decrypt
↓
Layer2 → final payload
The derived key decrypts the container using ChaCha20-Poly1305.
⚙️ Core Properties
- Computational Time Delay — nonce search space defines unlock time
- Memory-Hard Verification — Argon2id significantly increases brute-force cost
- Server-Optional Architecture — server may store only the nonce (not encrypted data)
- Offline Recovery Possible — nonce can be discovered through computation
- Integrated with PSQC — works alongside Phantom-Step Cascade encryption layers
🧩 Unlock Modes
Server-assisted unlock
A server may optionally store the real nonce and release it after a predefined time condition.
Offline unlock
The container can also be unlocked by discovering the nonce through brute-force search.
🧪 Potential Use Cases
- cryptographic time capsules
- delayed secret release
- long-term encrypted archives
- experimental time-lock encryption systems
📦 Download
SecretMemoryLocker-4.05-Windows-Portable.exe
📥 SecretMemoryLocker-4.05-Windows.zip
SecretML v4.03
SecretMemoryLocker v4.03
What's New in v4.03 — Phantom-Step Cascade Key Derivation
🔑 Phantom-Step Cascade — Deterministic Final Key Generation
SecretMemoryLocker v4.03 introduces an enhanced key derivation model based on a chained Argon2 cascade.
Core idea:
- Initial seed:
k = file_hash_seed - Each secret answer is processed sequentially
- Every step re-derives the key using the previous result as salt
- Final output becomes the deterministic
final_key
Conceptually:
k = file_hash_seed
for answer in answers:
k = Argon2(answer, salt=k)
final_key = k🛡 What This Achieves
- Multi-layer entropy amplification
- Order-dependent cryptographic strengthening
- No stored master key
- Deterministic and reproducible recovery
This update strengthens resistance against brute-force and structural attacks while preserving full recoverability.
SecretML v4.02
🚀 SecretMemoryLocker v4.02 — The Cognitive Challenge Update
🧠 The Interactive Defense: "Mind-over-Machine"
Version 4.02 introduces a paradigm shift in user authentication. Instead of static passwords, SecretML now utilizes Cognitive Entropy through an interactive challenge-response protocol.
🎭 New Feature: The Vault Quest
We’ve included a pre-configured challenge to demonstrate our Tri-State Security Logic. Can you distinguish the truth from the mirage?
How to test:
- Download the release and locate the
/Vaultfolder. - Launch the app and click the "Decrypt" button.
- Select
quest_protocol.jsonand then selectSecretML_Vault.zip. - Navigate the three-step cognitive filter:
- Truth Path: Enter 100% accurate data to access the authentic
license.txt. - Decoy Path: Enter "plausible" decoy answers to trigger a Plausible Deniability event. You'll unlock a Honey-pot file, designed to mislead intruders.
- MirageLoop: Any other input leads to an infinite processing loop — wasting an attacker's time without giving away a single bit of error data.
- Truth Path: Enter 100% accurate data to access the authentic
💡 SecretMemoryLocker — Where memory becomes a labyrinth and security is absolute.
📦 Download
SecretML v4.02 (Portable EXE)
📥 Download for Windows: SecretML v4.02.zip
Note: Extract the full ZIP archive to ensure the
/Vaultfolder is accessible for the challenge.
SecretML v3.15
🚀 What's New in v3.15 — Memory-Sync & Chained Recovery
🧠 Memory-Sync (Derived Access Key)
SecretML can now derive and securely store a session master key based on your answers — without ever saving the answers themselves.
- One non-reversible 256-bit Master-Hash
- Stored securely in the system keyring
- Enables instant access to multiple archives without re-entering answers
🔐 Per-Archive Unique Encryption
Every encrypted file receives its own unique password, even within the same session.
- Archive key =
SHA256(MasterHash + FileHash) - File hash is stored in archive metadata (comment)
- No two archives ever share the same encryption key
⛓ Chained Recovery (Memory Path Protection)
Access to the Master-Key is protected by a recursive question–answer chain.
- Each answer decrypts the next step
- No visible structure or plaintext questions
- Partial knowledge is useless
You don’t enter a password —
you unlock your own memory.
🛡 Zero-Knowledge Security Model
- Answers are never stored
- Only derived hashes exist
- Keyring data can be wiped instantly via UI
🧨 Instant Access Revocation
Removing archive metadata immediately breaks access —
even if the Master-Key still exists.
A true cryptographic kill-switch.
🧪 Status
- Stable Windows build
- No KDF (test version)
- Ready for real-world usage & testing
📦 Download
SecretML v3.15.exe
Memory-based encryption.
No passwords. No files. No traces.
Secret Memory Locker - v3.10
🚀 What's New in v3.10 — Enhanced SML-Seed & AI Security Core
🌱 Improved SML-Seed 24 Generation
Your 24-word seed phrases are now stronger and more reliable.
Enhancements:
- Increased entropy when generating SML-Seed 24 from archive data.
- More chaotic internal parameters for higher resistance to pattern analysis.
- Fixed multiple bugs related to edge-case seed reconstruction.
🤖 Expanded AI Question Engine
Security questions now provide deeper variability and stronger protection.
Upgrades:
- Larger internal AI dataset for question generation.
- More unique and less predictable question patterns.
- Better personalization without reducing security.
🛡 PRO Mode — Update Availability Checker
PRO users now see in-app version availability and get notified when a new SML release is published.
✅ Download SecretML v3.10
SML v3.10.zip
This update focuses on improving reliability, entropy, and long-term recoverability of your encrypted data.
SecretML v3.09
🚀 What's New in v3.09 — Memory Echo Password Generator (PRO)
🧠 Memory Echo Password Generator (PRO)
Generate infinite passwords dynamically — without ever storing them.
How it works:
- Combines your secret answers + the encrypted file hash (as salt).
- Produces unique, instantly reproducible passwords for any resource.
Steps to use:
- Activate PRO mode.
- Select your
*_SMLkey.jsonkey-file. - Answer your secret questions.
- Enter the resource name (e.g.
GMAIL.COM,FACEBOOK.COM). - Get your password instantly.
🔐 Password Formats
- SHA-256 (64 chars) — maximum entropy, hexadecimal string.
- SML-Echo (32 chars) — mix of uppercase, lowercase, numbers.
📌 Key Rules for Resource Names
- Exact input matters — same name = same password, even small changes break consistency.
- Case insensitive —
facebook.com=FACEBOOK.COM. - Keep it simple — e.g. use just
GMAIL.COM.
🛡 Why Memory Echo?
- On-the-fly — passwords never stored, exist only during generation.
- Offline mode — once activated, no internet is needed.
- Total control — only you, with answers + key-file, can restore passwords.
💡 Pro Tip: Use Memory Echo to create your master password (e.g. for Google Account).
This ensures guaranteed recovery and unbreakable security for your entire digital life.
SecretML v3.07
🚀 What's New in v3.07 — SML-AutoPIN
Secret Memory Locker v3.07 introduces the groundbreaking SML-AutoPIN feature:
🔐 SML-AutoPIN
- Unlimited passwords — no need to memorize or manage them manually.
- Simply choose a file — the app will securely archive it with a unique, automatically generated password.
- To decrypt, just select the archive and instantly recover your file.
This marks a new step towards effortless, memory-powered encryption.
SecretML v3.05
🚀 What's New in v3.05 — Keyring & Upcoming AutoPIN
Secret Memory Locker v3.05 introduces important updates and upcoming features:
🔑 Keyring Support
- Purchased key management — activate or remove your PRO keys directly in the app.
- Full deletion of key data when removing a key.
- Improved stability and reliability for key handling.
🛠 Improvements
- Several minor bug fixes to enhance overall performance and user experience.
⚡ Upcoming Feature: SML-AutoPIN
- Auto-generated archive passwords — create encrypted archives without entering a password.
- Every archive gets a unique, automatically generated password.
- Functionality under internal testing, coming soon.
SecretML v3.03
🚀 What's New in v3.03 — PRO Mode Upgrades
Secret Memory Locker v3.03 expands the PRO mode with groundbreaking features:
🌱 SecretML-Seed
- SecretML-Seed (12) — A 12-word seed phrase generated entirely from your memories. No physical storage required — your mind becomes the secure vault.
- SecretML-Seed (24) — Maximum entropy with a 24-word seed phrase. Full control, maximum security, and no need to ever write anything down.
🔑 Core Idea
Your memories + your archive generate the final entropy.
This means your security lives only in your head — not on paper, not on devices.
✅ Try the new SecretML-Seed and experience memory-based security!
SecretML v3.02
🚀 What's New in v3.02
🔑 PRO Mode
- Added PRO mode, activated with a license key.
- A test key is included in the package (
license_key.txt). - Upcoming PRO-exclusive innovative features (see below).
The buttons for the new features are already available in the interface, but the functions are still under internal testing. Stay tuned for activation in the next updates!
🌱 SecretML-Seed
- Seed phrase generation from memory:
- 12 words (SecretML-Seed 12)
- 24 words (SecretML-Seed 24)
- A simple and secure way to create recovery phrases without storing them in plain text.
🔒 SML-PIN
- New mode that adds a salt to the archive password, derived from your license key.
- Ensures each archive is unique and personalized.
🌀 Memory Echo (concept, coming soon)
- Password generator from memory.
- Your memory itself becomes the seed for password generation.
- Simple logic → endless stream of strong, unique passwords.
✅ Try SecretML v3.02 — the first step into the PRO world!
📸 Interface Preview
