Secret Memory Locker introduces Memory-Sync, a cryptographically secure mechanism that allows users to create and manage an unlimited number of encrypted archives without re-entering personal answers.
Each archive is protected by a unique, non-reusable encryption key, derived from your memories — never stored, never exposed.
Memory-Sync is a seamless encryption system that combines human memory with modern cryptography.
It ensures that each encrypted file has its own unique key while preserving strong privacy guarantees.
Even short, simple answers are transformed into a cryptographically strong 256-bit key using recursive SHA256 hashing.
Your answers are never stored locally.
Only a non-reversible Master-Hash is kept in the system keyring (e.g., Windows Credential Manager).
Full control via the “Delete Session Data” action instantly wipes all derived keys from the system keyring.
- Recovery JSON can be stored anywhere
- Archives remain independent, even within the same session
- Access control is enforced through archive metadata
When recovering access using the encrypted JSON file containing your question–answer chain:
Each answer is hashed individually: Hᵢ = SHA256(answerᵢ) All hashes are concatenated as raw bytes and hashed again: MasterHash = SHA256(H₁ || H₂ || ... || Hₙ)
➡ Result: 64-character (256-bit) Master-Hash
The MasterHash is stored in the system keyring using the keyring library.
To identify the correct recovery context without revealing sensitive filenames, the application generates a masked identifier from the source JSON:
secretmemory.json → s_r_m_r_.o
Even if you encrypt 100 files in a single session, each archive receives a completely unique password.
-
Before archiving, the file hash is calculated: H_file = SHA256(file)
-
This hash is written into the archive comment (metadata)
-
The final archive key is derived as:
FinalKey = SHA256(MasterHash + H_file)
- The application reads
H_filefrom the archive metadata - Combines it with the active
MasterHashfrom the keyring - Automatically derives the correct decryption key
Deleting or modifying the archive metadata:
- Instantly breaks access
- Works even if the Master-Key still exists
- Requires no re-encryption
This enables fast, metadata-level access revocation.
Access to the Master-Key is protected by a recursive decryption chain:
- Each correct answer decrypts the next block
- The previous answer becomes the key for the next stage
- The first answer decrypts the file hash bound to the archive
- Question structure is invisible in advance
- Partial knowledge is useless
- Brute-force attacks are impractical
You don’t simply enter a password —
you follow the path of your own memories.
Memory-Sync does not store secrets.
It remembers how to remember.
Only derived knowledge exists —
never the answers themselves.