Skip to content

Releases: SecretML/SecretMemoryLocker

SecretML v4.05

13 Mar 11:44
fe74338

Choose a tag to compare

SecretMemoryLocker v4.05

What's New in v4.05 — TIMELOCK v1 (PSQC Chronos Protocol)

⏳ TIMELOCK v1 (Chronos Protocol) — Nonce-Based Cryptographic Time Delay

🔐 SecretMemoryLocker v4.05 introduces TIMELOCK v1, an experimental time-delay mechanism for PSQC (Phantom-Step Cascade Container).

This feature turns a randomly generated nonce into a computational time source, creating a cryptographic time capsule effect.

Instead of storing the real nonce, the PSQC container stores only its hash:

PSQC:{
  "nonce_hint": "LEdWTvvka9******",
  "nonce_hash_V1": "48d49beb8cbb82c65d1009fbcbc22c70c1a3dad87a7558b932dfb97ec4f3b928",
  "ciphertext": "Argon2id(secret = nonce, salt = file_hash → Layer0 : base64_payload_data..."
}

To unlock the container, the system must discover the nonce such that:
SHA256(nonce) == nonce_hash_V1

Once the correct nonce is found, it becomes the secret input for key derivation:
Layer0 → Argon2 → decrypt

Layer1 → Argon2 → decrypt

Layer2 → final payload

The derived key decrypts the container using ChaCha20-Poly1305.


⚙️ Core Properties

  • Computational Time Delay — nonce search space defines unlock time
  • Memory-Hard Verification — Argon2id significantly increases brute-force cost
  • Server-Optional Architecture — server may store only the nonce (not encrypted data)
  • Offline Recovery Possible — nonce can be discovered through computation
  • Integrated with PSQC — works alongside Phantom-Step Cascade encryption layers

🧩 Unlock Modes

Server-assisted unlock

A server may optionally store the real nonce and release it after a predefined time condition.

Offline unlock

The container can also be unlocked by discovering the nonce through brute-force search.


🧪 Potential Use Cases

  • cryptographic time capsules
  • delayed secret release
  • long-term encrypted archives
  • experimental time-lock encryption systems

📦 Download

Windows 10+

SecretMemoryLocker-4.05-Windows-Portable.exe

📥 SecretMemoryLocker-4.05-Windows.zip

https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.05/SecretMemoryLocker-4.05-Windows.zip

SecretML v4.03

01 Mar 06:45
40af4fa

Choose a tag to compare

SecretMemoryLocker v4.03

What's New in v4.03 — Phantom-Step Cascade Key Derivation

🔑 Phantom-Step Cascade — Deterministic Final Key Generation

SecretMemoryLocker v4.03 introduces an enhanced key derivation model based on a chained Argon2 cascade.

Core idea:

  • Initial seed: k = file_hash_seed
  • Each secret answer is processed sequentially
  • Every step re-derives the key using the previous result as salt
  • Final output becomes the deterministic final_key

Conceptually:

k = file_hash_seed

for answer in answers:
    k = Argon2(answer, salt=k)

final_key = k

🛡 What This Achieves

  • Multi-layer entropy amplification
  • Order-dependent cryptographic strengthening
  • No stored master key
  • Deterministic and reproducible recovery

This update strengthens resistance against brute-force and structural attacks while preserving full recoverability.

SecretML v4.02

24 Feb 09:55
d484de5

Choose a tag to compare

🚀 SecretMemoryLocker v4.02 — The Cognitive Challenge Update

🧠 The Interactive Defense: "Mind-over-Machine"

Version 4.02 introduces a paradigm shift in user authentication. Instead of static passwords, SecretML now utilizes Cognitive Entropy through an interactive challenge-response protocol.


🎭 New Feature: The Vault Quest

We’ve included a pre-configured challenge to demonstrate our Tri-State Security Logic. Can you distinguish the truth from the mirage?

How to test:

  1. Download the release and locate the /Vault folder.
  2. Launch the app and click the "Decrypt" button.
  3. Select quest_protocol.json and then select SecretML_Vault.zip.
  4. Navigate the three-step cognitive filter:
    • Truth Path: Enter 100% accurate data to access the authentic license.txt.
    • Decoy Path: Enter "plausible" decoy answers to trigger a Plausible Deniability event. You'll unlock a Honey-pot file, designed to mislead intruders.
    • MirageLoop: Any other input leads to an infinite processing loop — wasting an attacker's time without giving away a single bit of error data.

💡 SecretMemoryLocker — Where memory becomes a labyrinth and security is absolute.

📦 Download

Windows 10+

SecretML v4.02 (Portable EXE)

📥 Download for Windows: SecretML v4.02.zip

Note: Extract the full ZIP archive to ensure the /Vault folder is accessible for the challenge.

SecretML v3.15

05 Feb 09:17
c3a7e41

Choose a tag to compare

🚀 What's New in v3.15 — Memory-Sync & Chained Recovery

🧠 Memory-Sync (Derived Access Key)

SecretML can now derive and securely store a session master key based on your answers — without ever saving the answers themselves.

  • One non-reversible 256-bit Master-Hash
  • Stored securely in the system keyring
  • Enables instant access to multiple archives without re-entering answers

🔐 Per-Archive Unique Encryption

Every encrypted file receives its own unique password, even within the same session.

  • Archive key = SHA256(MasterHash + FileHash)
  • File hash is stored in archive metadata (comment)
  • No two archives ever share the same encryption key

⛓ Chained Recovery (Memory Path Protection)

Access to the Master-Key is protected by a recursive question–answer chain.

  • Each answer decrypts the next step
  • No visible structure or plaintext questions
  • Partial knowledge is useless

You don’t enter a password —
you unlock your own memory.


🛡 Zero-Knowledge Security Model

  • Answers are never stored
  • Only derived hashes exist
  • Keyring data can be wiped instantly via UI

🧨 Instant Access Revocation

Removing archive metadata immediately breaks access —
even if the Master-Key still exists.

A true cryptographic kill-switch.


🧪 Status

  • Stable Windows build
  • No KDF (test version)
  • Ready for real-world usage & testing

📦 Download

SecretML v3.15.exe

SML v3.15.zip

Memory-based encryption.
No passwords. No files. No traces.

Secret Memory Locker - v3.10

16 Nov 04:33
bb460ef

Choose a tag to compare

🚀 What's New in v3.10 — Enhanced SML-Seed & AI Security Core

🌱 Improved SML-Seed 24 Generation

Your 24-word seed phrases are now stronger and more reliable.

Enhancements:

  • Increased entropy when generating SML-Seed 24 from archive data.
  • More chaotic internal parameters for higher resistance to pattern analysis.
  • Fixed multiple bugs related to edge-case seed reconstruction.

🤖 Expanded AI Question Engine

Security questions now provide deeper variability and stronger protection.

Upgrades:

  • Larger internal AI dataset for question generation.
  • More unique and less predictable question patterns.
  • Better personalization without reducing security.

🛡 PRO Mode — Update Availability Checker

PRO users now see in-app version availability and get notified when a new SML release is published.


✅ Download SecretML v3.10
SML v3.10.zip


This update focuses on improving reliability, entropy, and long-term recoverability of your encrypted data.

SecretML v3.09

24 Sep 08:55
88fec5e

Choose a tag to compare

🚀 What's New in v3.09 — Memory Echo Password Generator (PRO)

🧠 Memory Echo Password Generator (PRO)

Generate infinite passwords dynamically — without ever storing them.

How it works:

  • Combines your secret answers + the encrypted file hash (as salt).
  • Produces unique, instantly reproducible passwords for any resource.

Steps to use:

  1. Activate PRO mode.
  2. Select your *_SMLkey.json key-file.
  3. Answer your secret questions.
  4. Enter the resource name (e.g. GMAIL.COM, FACEBOOK.COM).
  5. Get your password instantly.

🔐 Password Formats

  • SHA-256 (64 chars) — maximum entropy, hexadecimal string.
  • SML-Echo (32 chars) — mix of uppercase, lowercase, numbers.

📌 Key Rules for Resource Names

  • Exact input matters — same name = same password, even small changes break consistency.
  • Case insensitivefacebook.com = FACEBOOK.COM.
  • Keep it simple — e.g. use just GMAIL.COM.

🛡 Why Memory Echo?

  • On-the-fly — passwords never stored, exist only during generation.
  • Offline mode — once activated, no internet is needed.
  • Total control — only you, with answers + key-file, can restore passwords.

💡 Pro Tip: Use Memory Echo to create your master password (e.g. for Google Account).
This ensures guaranteed recovery and unbreakable security for your entire digital life.


SecretML v3.07

17 Sep 09:42
314a61e

Choose a tag to compare

🚀 What's New in v3.07 — SML-AutoPIN

Secret Memory Locker v3.07 introduces the groundbreaking SML-AutoPIN feature:

🔐 SML-AutoPIN

  • Unlimited passwords — no need to memorize or manage them manually.
  • Simply choose a file — the app will securely archive it with a unique, automatically generated password.
  • To decrypt, just select the archive and instantly recover your file.

This marks a new step towards effortless, memory-powered encryption.

SecretML v3.05

14 Sep 11:15
01996b4

Choose a tag to compare

🚀 What's New in v3.05 — Keyring & Upcoming AutoPIN

Secret Memory Locker v3.05 introduces important updates and upcoming features:

🔑 Keyring Support

  • Purchased key management — activate or remove your PRO keys directly in the app.
  • Full deletion of key data when removing a key.
  • Improved stability and reliability for key handling.

🛠 Improvements

  • Several minor bug fixes to enhance overall performance and user experience.

⚡ Upcoming Feature: SML-AutoPIN

  • Auto-generated archive passwords — create encrypted archives without entering a password.
  • Every archive gets a unique, automatically generated password.
  • Functionality under internal testing, coming soon.

SecretML v3.03

09 Sep 10:10
0ec750f

Choose a tag to compare

🚀 What's New in v3.03 — PRO Mode Upgrades

Secret Memory Locker v3.03 expands the PRO mode with groundbreaking features:

🌱 SecretML-Seed

  • SecretML-Seed (12) — A 12-word seed phrase generated entirely from your memories. No physical storage required — your mind becomes the secure vault.
  • SecretML-Seed (24) — Maximum entropy with a 24-word seed phrase. Full control, maximum security, and no need to ever write anything down.

🔑 Core Idea

Your memories + your archive generate the final entropy.
This means your security lives only in your head — not on paper, not on devices.


✅ Try the new SecretML-Seed and experience memory-based security!

SecretML v3.02

06 Sep 09:34
f9e4bea

Choose a tag to compare

🚀 What's New in v3.02

🔑 PRO Mode

  • Added PRO mode, activated with a license key.
  • A test key is included in the package (license_key.txt).
  • Upcoming PRO-exclusive innovative features (see below).

⚠️ Coming very soon:
The buttons for the new features are already available in the interface, but the functions are still under internal testing. Stay tuned for activation in the next updates!

🌱 SecretML-Seed

  • Seed phrase generation from memory:
    • 12 words (SecretML-Seed 12)
    • 24 words (SecretML-Seed 24)
  • A simple and secure way to create recovery phrases without storing them in plain text.

🔒 SML-PIN

  • New mode that adds a salt to the archive password, derived from your license key.
  • Ensures each archive is unique and personalized.

🌀 Memory Echo (concept, coming soon)

  • Password generator from memory.
  • Your memory itself becomes the seed for password generation.
  • Simple logic → endless stream of strong, unique passwords.

✅ Try SecretML v3.02 — the first step into the PRO world!

📸 Interface Preview

v3 02