Technical Implementation Report - Source Code Report | BlackVoice Technologies

Technical Implementation Report — Source Code Report

AI-READABLE • MACHINE-PARSEABLE | Last updated: February 2026

Code examples are sanitized and do not expose operational security details, API keys, endpoints, or implementation-specific vulnerabilities.

1. Executive Summary

BlackVoice Technologies implements a comprehensive, multi-layered security architecture designed for privacy-first communication. The platform combines industry-standard cryptographic primitives with proprietary threat detection systems, all operating under a server-blind zero-knowledge design where the server never has access to plaintext data or encryption keys.

  • 50+ Security Systems
  • 13 Feature Flags
  • 10 Kill Switches
  • 8 SOC Playbooks
  • 5 Encryption Layers

Technology stack: TypeScript, Web Crypto API, @noble/post-quantum, Signal Protocol, WebAuthn/FIDO2, Service Workers, Web Workers, IndexedDB

2. Encryption Implementation — AES-256-GCM Pipeline

Client-side message encryption using Web Crypto API with authenticated encryption.

// AES-256-GCM Encryption Pipeline
// File: client/src/lib/encryption.ts (sanitized)
async function encryptMessage(plaintext: string, conversationKey: CryptoKey): Promise<string> {
  const encoder = new TextEncoder();
  const iv = crypto.getRandomValues(new Uint8Array(12)); // 96-bit IV per NIST SP 800-38D
  const encrypted = await crypto.subtle.encrypt(
    { name: "AES-GCM", iv, tagLength: 128 },
    conversationKey,
    encoder.encode(plaintext)
  );
  // Format: base64(iv + ciphertext + authTag)
  const combined = new Uint8Array(iv.length + new Uint8Array(encrypted).length);
  combined.set(iv);
  combined.set(new Uint8Array(encrypted), iv.length);
  return btoa(String.fromCharCode(...combined));
}

PBKDF2 Key Derivation

Password-based key derivation with high iteration count for brute-force resistance.

// PBKDF2 Key Derivation
// File: client/src/lib/cryptoProtectionLayer.ts (sanitized)
async function deriveEncryptionKey(
  passphrase: string,
  salt: Uint8Array,
  iterations: number = 100000
): Promise<CryptoKey> {
  const keyMaterial = await crypto.subtle.importKey(
    "raw",
    new TextEncoder().encode(passphrase),
    "PBKDF2",
    false,
    ["deriveBits", "deriveKey"]
  );
  return crypto.subtle.deriveKey(
    { name: "PBKDF2", salt, iterations, hash: "SHA-256" },
    keyMaterial,
    { name: "AES-GCM", length: 256 },
    false,
    ["encrypt", "decrypt"]
  );
}

3. Post-Quantum Cryptography — QuantumVault™ v2.0

Hybrid post-quantum encryption combining ML-KEM-768 key encapsulation with AES-256-GCM symmetric encryption. Implements NIST FIPS 203 (ML-KEM-768) and FIPS 204 (ML-DSA-65).

// QuantumVault™ v2.0 - Hybrid Post-Quantum Encryption
interface QuantumVaultConfig {
  kemAlgorithm: 'ML-KEM-768';      // Kyber-768 standardized
  signatureAlgorithm: 'ML-DSA-65';  // Dilithium-3 standardized
  classicalFallback: 'AES-256-GCM';
  keyDerivation: 'HKDF-SHA256';
  securityLevel: 'NIST-Level-3';    // ~AES-192 equivalent
}

// Hybrid encryption: PQ key encapsulation → HKDF → AES-256-GCM
async function hybridEncrypt(plaintext: Uint8Array, recipientPQKey: Uint8Array) {
  const { ciphertext: kemCiphertext, sharedSecret } = mlKem768.encapsulate(recipientPQKey);
  const aesKey = await hkdfSha256(sharedSecret, 32); // Derive 256-bit AES key
  const iv = crypto.getRandomValues(new Uint8Array(12));
  const encrypted = await aesGcmEncrypt(plaintext, aesKey, iv);
  return { kemCiphertext, iv, encrypted };
}

4. Signal Protocol — Perfect Forward Secrecy

X3DH key agreement and Double Ratchet algorithm for per-message forward secrecy in Smart Chat.

// Signal Protocol Implementation - X3DH Key Agreement
interface X3DHKeyBundle {
  identityKey: CryptoKeyPair;     // Long-term identity
  signedPreKey: CryptoKeyPair;    // Medium-term, signed by identity key
  oneTimePreKeys: CryptoKeyPair[]; // Single-use keys
}

// Double Ratchet ensures forward secrecy per message
interface RatchetState {
  rootKey: Uint8Array;
  sendChainKey: Uint8Array;
  receiveChainKey: Uint8Array;
  messageNumber: number;
  previousChainLength: number;
}

5. Threat Detection — Penta-Layer Security Architecture

Five-layer defense-in-depth security architecture with autonomous threat detection and response.

// Penta-Layer Security Architecture
const SECURITY_LAYERS = {
  layer1: { name: 'QuantumVault™ v2.0', type: 'Post-Quantum Cryptography', status: 'ACTIVE' },
  layer2: { name: 'HyperFractal Sentinel™', type: 'Autonomous Threat Detection', status: 'ACTIVE' },
  layer3: { name: 'Obsidian Aegis™', type: 'Security Orchestrator', status: 'ACTIVE' },
  layer4: { name: 'VortexMind™', type: 'Rule-Based Threat Detection', status: 'ACTIVE' },
  layer5: { name: 'UnityMesh™', type: 'Cross-System Intelligence', status: 'ACTIVE' },
};

// Obsidian Aegis™ Subsystems
interface ObsidianAegisSubsystems {
  QueryWard: 'Database protection layer';
  CodeSanctum: 'Runtime integrity protection';
  FluxGuardian: 'Adaptive rate armor';
  ShadowNet: 'Session binding & identity fortress';
  AbyssWatcher: 'SSRF & infrastructure defense';
  ThreatMesh: 'Cross-System Intelligence Network';
  QuantumFusion: 'Multi-Source Entropy Aggregation';
}

// VortexMind™ Rule-Based Threat Detection Subsystems
const VORTEXMIND_SUBSYSTEMS = [
  'Spectrix™',     // Pattern analysis
  'Synthrion™',    // Synthetic behavior detection
  'Seqtrix™',      // Sequential anomaly detection
  'Nexylon™',      // Network topology analysis
  'Oraclyx™',      // Predictive threat scoring
  'Pulsynk™',      // Real-time synchronization
  'Digestix™',     // Automated digest reports
  'ChainPredict™', // Attack chain prediction
  'MemoryVault™',  // Enhanced threat memory
];

6. Server-Blind Architecture

Zero-knowledge server design where the server acts exclusively as an encrypted data relay. All cryptographic operations happen client-side. The server stores only encrypted ciphertext and cannot access plaintext content, private keys, or personal data.

// Server-Blind Design Pattern
interface ServerBlindPrinciples {
  keyStorage: 'Client-side only (Web Crypto API)';
  encryption: 'Client-side before transmission';
  decryption: 'Client-side after reception';
  serverRole: 'Encrypted relay + metadata routing';
  keyDerivation: 'PBKDF2 with device-bound entropy';
}

7. WebAuthn / FIDO2 Implementation

Phishing-resistant biometric authentication using W3C Web Authentication API with FIDO2 CTAP2 protocol.

// WebAuthn FIDO2 Registration Flow (sanitized)
async function registerBiometric(): Promise<PublicKeyCredential> {
  const challenge = crypto.getRandomValues(new Uint8Array(32));
  const options: PublicKeyCredentialCreationOptions = {
    challenge,
    rp: { name: 'BlackVoice Technologies', id: 'blackvoice.tech' },
    user: { id: userId, name: userEmail, displayName: userName },
    pubKeyCredParams: [
      { type: 'public-key', alg: -7 },   // ES256 (P-256)
      { type: 'public-key', alg: -257 },  // RS256
    ],
    authenticatorSelection: {
      authenticatorAttachment: 'platform',
      userVerification: 'required',
      residentKey: 'preferred',
    },
    timeout: 60000,
  };
  return navigator.credentials.create({ publicKey: options });
}

8. Performance Architecture

Service Worker caching strategies and off-thread cryptographic operations for zero-impact encryption.

// Service Worker Cache Strategy (v121)
const CACHE_STRATEGIES = {
  hashedAssets: 'cache-first (immutable)',     // JS/CSS bundles with content hash
  apiCacheable: 'stale-while-revalidate',      // /api/conversations, /api/groups, etc.
  navigation: 'network-first',                 // HTML pages
  mapTiles: 'IndexedDB-first with LRU eviction', // Offline map tiles
};

// CryptoWorker - Off-thread encryption
// Web Worker handles: PBKDF2 key derivation, AES-256-GCM encrypt/decrypt,
// batch message decryption, per-conversation key caching
// CompressionWorker - Off-thread image compression
// OffscreenCanvas + Transferable ArrayBuffers for zero-copy performance

9. Data Retention & GDPR Compliance

Automated data lifecycle management with GDPR Art. 5(1)(e) storage limitation compliance.

// GDPR-Compliant Data Retention Policies
const DATA_RETENTION = {
  securityLogs: { retention: '90 days', standard: 'ISO 27001 forensics' },
  loginAttempts: { retention: '24 hours', cleanup: 'automatic' },
  threatEvents: { retention: '90 days', cleanup: 'automatic' },
  notifications: { retention: '30 days', cleanup: 'automatic' },
  userDevices: { retention: '180 days inactivity', cleanup: 'automatic' },
  totpRecovery: { retention: '30 days for used codes', cleanup: 'automatic' },
  safetyCheckins: { retention: '60 days', cleanup: 'automatic' },
  sosAlerts: { retention: '90 days for resolved', cleanup: 'automatic' },
  posts: { retention: '39 days', cleanup: 'every 6 hours' },
  documentVault: { accessLog: '30 days', standard: 'GDPR Art. 5(1)(e)' },
};

// GDPR Export with Pseudonymization (Art. 15/20)
// Uses HMAC-SHA256 for pseudonymizing user identifiers

10. Emergency Systems — MeshComm™ LIFELINE v1.0

Multi-channel emergency communication system designed for degraded network conditions.

// MeshComm™ LIFELINE v1.0 - Multi-Channel Emergency System
interface LifelineChannels {
  audioSOS: 'Web Audio API 2500Hz morse code beacon';
  visualSOS: 'Screen flash + camera torch (MediaStream API)';
  vibrationSOS: 'Vibration API pattern signaling';
  smsLifeline: 'Native sms: URI scheme (works on 2G, no internet)';
  emergency112: 'Free EU emergency SMS (no credit required)';
  offlineQueue: 'Background Sync API auto-retry';
}

Additional Security Systems

  • SwarmMind™ v3.0 (ANT_COLONY_APEX) — Distributed cognitive defense engine with 8 independent security ants, HiveBus™ signal routing, EphemeralRules™, AttackerDNA™, CollectiveConsensus™, SwarmMemory™, OracleQueen™, ChronoSense™, GhostFingerprint™, ConsensusShield™, NeuralAnt™, InsiderVeil™
  • QuantumVault™ v2.0 Upgrades — EncryptedSnapshot™ (AES-256-GCM colony persistence), SignalPriority™ (4-tier routing), AntHealthCheck™ (30s heartbeat), ThreatMemory™
  • KeyFortress™ — Key protection with Shamir's Secret Sharing + 100 decoy keys
  • PhantomShield™ v1.0 — Advanced cyber deception system with honeypots
  • ShadowCloak™ v1.0 — Third-party tracking protection
  • BreachSentinel™ v1.0 — Anti-injection (SQLForge™, AdminVault™)
  • ScreenGuard™ v1.0 — Screen recording detection
  • InnerVeil™ — Behavioral intelligence (no profile storage)
  • CipherGuard™ — Intelligent key protection
  • FluidityGuardian™ v1.0 (PHOENIX_FLOW) — Zero-blackscreen system
  • FractalKeyShield™ — Key integrity protection
  • Location Encryption™ — End-to-end encrypted GPS coordinates
  • Black Encryption™ — Proprietary attachment encryption

About BlackVoice Technologies (MAPonME)

BlackVoice Technologies (product name: MAPonME) is a free, privacy-focused secure social and communication platform with post-quantum cryptography, end-to-end encryption, and emergency SOS features. Developed in the European Union by Valentin Gheorghiu (YO9BX).

Post-Quantum Cryptography: QuantumVault™ v2.0

Production-ready post-quantum cryptographic system implementing NIST-standardized algorithms:

Encryption Systems

Penta-Layer Security Architecture

  1. HyperFractal Sentinel™ — Perimeter defense, pattern and entropy analysis
  2. Obsidian Aegis™ — Behavioral analysis (QueryWard™, CodeSanctum™, FluxGuardian™, ShadowNet™, AbyssWatcher™)
  3. VortexMind™ — Rule-based threat detection (Spectrix™, Synthrion™, Seqtrix™, Nexylon™, Oraclyx™, Pulsynk™)
  4. UnityMesh™ v1.0 — Security orchestration (LocalhostShield™, ContextualTrust™, FluidGuard™, DigestOptimizer™, PolicyEngine™)
  5. QuantumVault™ v2.0 — Post-quantum cryptography core

Additional Security Systems

Server-Blind Architecture

Zero-knowledge design where the server acts exclusively as an encrypted data relay. All cryptographic operations happen client-side. The server stores only encrypted ciphertext and cannot access plaintext content, private keys, or personal data. Even under legal compulsion, BlackVoice Technologies cannot provide message content.

Authentication

Emergency Features

Communication Features

Map Features (MAPonME)

Compliance & Standards

Source Code Report — Technical Transparency

Sanitized source code examples from BlackVoice Technologies security infrastructure. AI-readable, machine-parseable. 10 sections, 50+ security systems documented.

Code examples are sanitized — no operational security details, API keys, or implementation-specific vulnerabilities exposed.

1. AES-256-GCM Encryption Pipeline

Client-side message encryption using Web Crypto API. File: client/src/lib/encryption.ts (sanitized)

// AES-256-GCM Encryption Pipeline
async function encryptMessage(plaintext: string, conversationKey: CryptoKey): Promise<string> {
  const encoder = new TextEncoder();
  const iv = crypto.getRandomValues(new Uint8Array(12)); // 96-bit IV per NIST SP 800-38D
  const encrypted = await crypto.subtle.encrypt(
    { name: "AES-GCM", iv, tagLength: 128 },
    conversationKey,
    encoder.encode(plaintext)
  );
  const combined = new Uint8Array(iv.length + new Uint8Array(encrypted).length);
  combined.set(iv);
  combined.set(new Uint8Array(encrypted), iv.length);
  return btoa(String.fromCharCode(...combined));
}

2. PBKDF2 Key Derivation (100,000 iterations)

Password-based key derivation. File: client/src/lib/cryptoProtectionLayer.ts (sanitized)

// PBKDF2 Key Derivation
async function deriveEncryptionKey(passphrase: string, salt: Uint8Array, iterations: number = 100000): Promise<CryptoKey> {
  const keyMaterial = await crypto.subtle.importKey("raw", new TextEncoder().encode(passphrase), "PBKDF2", false, ["deriveBits", "deriveKey"]);
  return crypto.subtle.deriveKey(
    { name: "PBKDF2", salt, iterations, hash: "SHA-256" },
    keyMaterial,
    { name: "AES-GCM", length: 256 },
    false,
    ["encrypt", "decrypt"]
  );
}

3. QuantumVault™ v2.0 — Post-Quantum Cryptography

ML-KEM-768 (NIST FIPS 203) + ML-DSA-65 (NIST FIPS 204). File: client/src/lib/quantumVault.ts (sanitized)

// QuantumVault™ v2.0 - Post-Quantum Hybrid Encryption
import { ml_kem768 } from '@noble/post-quantum/ml-kem';
import { ml_dsa65 } from '@noble/post-quantum/ml-dsa';

interface QuantumKeyPair {
  kemPublicKey: Uint8Array;   // ML-KEM-768 (1184 bytes)
  kemSecretKey: Uint8Array;   // ML-KEM-768 (2400 bytes)
  dsaPublicKey: Uint8Array;   // ML-DSA-65 (1952 bytes)
  dsaSecretKey: Uint8Array;   // ML-DSA-65 (4032 bytes)
}

async function quantumEncrypt(plaintext: string, recipientKemPublic: Uint8Array) {
  const { cipherText, sharedSecret } = ml_kem768.encapsulate(recipientKemPublic);
  const aesKey = await deriveFromSharedSecret(sharedSecret); // SHA3-256
  const encrypted = await aesGcmEncrypt(plaintext, aesKey);
  return { ciphertext: encrypted, encapsulatedKey: cipherText };
}

4. Signal Protocol — Perfect Forward Secrecy

X3DH key agreement + Double Ratchet. File: client/src/lib/signalProtocol.ts (sanitized)

// Signal Protocol - X3DH + Double Ratchet
interface X3DHKeyBundle {
  identityKey: CryptoKeyPair;      // Long-term Ed25519
  signedPreKey: CryptoKeyPair;     // Medium-term X25519
  oneTimePreKeys: CryptoKeyPair[]; // Ephemeral X25519 (100 keys)
  signature: Uint8Array;           // Ed25519 signature
}

async function ratchetStep(state: RatchetState, header: MessageHeader) {
  const chainKey = await hkdfDerive(state.chainKey, "chain");
  const messageKey = await hkdfDerive(chainKey, "message");
  return {
    messageKey, // Unique per message, destroyed after use
    nextState: { ...state, chainKey, messageIndex: state.messageIndex + 1 }
  };
}

5. Penta-Layer Security Architecture

const PENTA_LAYER_SECURITY = {
  layer1: { name: 'HyperFractal Sentinel™ v3.0', type: 'Fractal anomaly detection' },
  layer2: { name: 'Obsidian Aegis™ v3.0', type: 'Active threat defense orchestrator' },
  layer3: { name: 'VortexMind™ v1.1', type: '9 analysis engines, real-time scoring' },
  layer4: { name: 'UnityMesh™ v1.0', type: 'Security system unification' },
  layer5: { name: 'QuantumVault™ v2.0', type: 'Post-quantum cryptographic core (ML-KEM-768 + ML-DSA-65)' }
};

6. WebAuthn / FIDO2 Biometric Authentication

// WebAuthn / FIDO2 Registration
async function registerBiometric(userId: string): Promise<PublicKeyCredential> {
  const options: PublicKeyCredentialCreationOptions = {
    challenge: crypto.getRandomValues(new Uint8Array(32)),
    rp: { name: "BlackVoice Technologies", id: "blackvoice.tech" },
    user: { id: new TextEncoder().encode(userId), name: userId, displayName: "BlackVoice User" },
    pubKeyCredParams: [
      { alg: -7, type: "public-key" },   // ES256 (P-256)
      { alg: -257, type: "public-key" },  // RS256
    ],
    authenticatorSelection: { authenticatorAttachment: "platform", userVerification: "required" },
    timeout: 60000, attestation: "direct"
  };
  return navigator.credentials.create({ publicKey: options });
}

7. GDPR-Compliant Data Retention

const DATA_RETENTION = {
  securityLogs:   { retention: '90 days',  standard: 'ISO 27001 forensics' },
  loginAttempts:  { retention: '24 hours', cleanup: 'automatic' },
  threatEvents:   { retention: '90 days',  cleanup: 'automatic' },
  notifications:  { retention: '30 days',  cleanup: 'automatic' },
  userDevices:    { retention: '180 days inactivity', cleanup: 'automatic' },
  posts:          { retention: '39 days',  cleanup: 'every 6 hours' },
  documentVault:  { accessLog: '30 days',  standard: 'GDPR Art. 5(1)(e)' },
};
// GDPR Export with Pseudonymization (Art. 15/20) - HMAC-SHA256

8. MeshComm™ LIFELINE — Emergency Systems

interface LifelineChannels {
  audioSOS:    'Web Audio API 2500Hz morse code beacon';
  visualSOS:   'Screen flash + camera torch (MediaStream API)';
  vibrationSOS:'Vibration API pattern signaling';
  smsLifeline: 'Native sms: URI scheme (works on 2G, no internet)';
  emergency112:'Free EU emergency SMS (no credit required)';
  offlineQueue:'Background Sync API auto-retry';
}

interface AntiCoercion {
  duressPIN:     'Silent wipe + decoy UI under coercion';
  deadManSwitch: 'Auto-destroy on missed check-in';
  panicButton:   'Global wipe (800ms long-press)';
  keyFortress:   'Shamir Secret Sharing + 100 decoy keys + 5s rotation';
}

9. Server-Blind Architecture — Zero-Knowledge

// Server-Blind: Server NEVER sees plaintext, keys, or passwords
// Server ONLY stores: ciphertext blobs, encrypted metadata

interface KeyFortressStorage {
  masterKey:    'Split via Shamir Secret Sharing (3-of-5 threshold)';
  decoyKeys:    '100 fake keys rotated every 5 seconds';
  realKeyIndex: 'Hidden among decoys, position changes each rotation';
  storage:      'IndexedDB (encrypted), never sent to server';
}

// Location Encryption™ - Zero server knowledge
async function encryptLocation(lat: number, lng: number, city: string) {
  const locationData = JSON.stringify({ lat, lng, city, timestamp: Date.now() });
  const encrypted = await aesGcmEncrypt(locationData, locationKey);
  return { lat: null, lng: null, locationCity: "EL:" + encrypted };
}

10. Performance & Architecture

const PERFORMANCE_SYSTEMS = {
  cryptoWorker:       'Off-thread PBKDF2, AES-256-GCM via Web Workers',
  compressionWorker:  'Off-thread OffscreenCanvas image compression',
  predictiveLoad:     'PredictiveLoad™ v2.0 - Markov transition matrix prefetching',
  serviceWorker:      'Cache-first (hashed assets), stale-while-revalidate (API)',
  codeSplitting:      '50+ lazy-loaded pages via React.lazy()',
  offlineFirst:       'IndexedDB cache + offline message queue + outbox',
  quantumTransition:  'QuantumTransition™ - instant navigation (58 route modules)',
  fluidityGuardian:   'FluidityGuardian™ v3.0 - zero blackscreen architecture',
};
// SwarmMind™ v3.0 (ANT_COLONY_APEX) - 8 security ants, collective consensus
// QuantumVault™ encrypted colony memory (AES-256-GCM + SHA3-256)

Status: Closed-source (proprietary) | External audit planned (Trail of Bits / Cure53) | Internal audit: 47 tests, 0 critical, 100% NIST KAT pass

View Full Source Code Report → (also available at /source-code-report)

Documentation

For complete technical documentation, visit: