Releases: SecretML/SecretMemoryLocker
SML v4.08
MemoryEcho — Dual Key Output
MemoryEcho now provides two distinct key outputs during reconstruction.
New capabilities:
- PSQ Key — dynamic key derived from the current archive context
- Memory-Derived Key — stable key based purely on your answers
The Memory-Derived Key:
- remains identical across all versions and encryptions
- depends only on your answers
- acts as a persistent identity-level cryptographic root
🍏 Experimental: Memory-Derived Apple Identity (MDAI)
New experimental feature available for testing.
Concept:
- Regenerate Apple credentials deterministically from memory
Supports:
- iPhone passcode
- Apple ID
- FileVault
Key idea:
A single memory-derived key → full identity reconstruction
- No backups
- No storage
- No cloud dependency
📦 Download
SML-4.08-Windows-Portable.exe
📥 SML-4.08-Windows.zip
https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.08/SML-4.08-Windows.zip
SML v4.07
🧠 MemoryEcho — Secure Derived Key Display
Secure handling of the memory-derived key during reconstruction.
Improvements:
- Controlled visibility of the derived key (no persistent exposure)
- Reduced risk of accidental disclosure during generation
- Safer interaction model for sensitive cryptographic output
🔐 PassEcho Mode — Standalone Key Generation Container
New standalone mode for secure key generation.
Features:
- Create a separate encrypted container
- Works as an independent master key generator
- No dependency on the main archive after creation
- Designed for portable and isolated usage
🎭 Hardened Decoy Layers
Decoy protection has been significantly upgraded.
Enhancements:
- All decoy layers are now encrypted and obfuscated
- Impossible to reliably distinguish real vs decoy data
- Stronger plausible deniability in real-world scenarios
⚙️ Selectable Key Reconstruction Mode (V4 / V5)
Full control over key derivation logic.
Capabilities:
- Choose between V4 (Sequential Argon2 Chain)
- Or V5 (Stateful Memory-Hard Cascade)
- Enables compatibility, testing, and security tuning
💡 This release focuses on stronger isolation, better control over sensitive outputs, and deeper cryptographic flexibility.
📦 Download
SML-4.07-Windows-Portable.exe
📥 SML-4.07-Windows.zip
https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.07/SML-4.07-Windows.zip
SML v4.06
What's New in v4.06 — Stability & UI Improvements
🎨 Improved Shortcut Icon Design
Cleaner and more refined icons for a better visual experience.
🛠 Bug Fixes
- Fixed several minor issues affecting usability.
⚙️ Stability Improvements
- Enhanced overall application stability and performance.
📦 Download
SecretMemoryLocker-4.06-Windows-Portable.exe
📥 SML-4.06-Windows.zip
https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.06/SML-4.06-Windows.zip
SecretML v4.05
What's New in v4.05 — TIMELOCK v1 (PSQC Chronos Protocol)
⏳ TIMELOCK v1 (Chronos Protocol) — Nonce-Based Cryptographic Time Delay
🔐 SecretMemoryLocker v4.05 introduces TIMELOCK v1, an experimental time-delay mechanism for PSQC (Phantom-Step Cascade Container).
This feature turns a randomly generated nonce into a computational time source, creating a cryptographic time capsule effect.
Instead of storing the real nonce, the PSQC container stores only its hash:
PSQC:{
"nonce_hint": "LEdWTvvka9******",
"nonce_hash_V1": "48d49beb8cbb82c65d1009fbcbc22c70c1a3dad87a7558b932dfb97ec4f3b928",
"ciphertext": "Argon2id(secret = nonce, salt = file_hash → Layer0 : base64_payload_data..."
}
To unlock the container, the system must discover the nonce such that:
SHA256(nonce) == nonce_hash_V1
Once the correct nonce is found, it becomes the secret input for key derivation:
Phantom-Step Cascade (nonce-seeded)
nonce
↓KDF₀ = Argon2(nonce, salt₀)
↓
Decrypt Layer₀ → data₀
↓KDF₁ = Argon2(data₀, salt₁)
↓
Decrypt Layer₁ → data₁
↓↓
...
↓↓
Final Payload (final key + real data)
The derived key decrypts the container using ChaCha20-Poly1305.
⚙️ Core Properties
- Computational Time Delay — nonce search space defines unlock time
- Memory-Hard Verification — Argon2id significantly increases brute-force cost
- Server-Optional Architecture — server may store only the nonce (not encrypted data)
- Offline Recovery Possible — nonce can be discovered through computation
- Integrated with PSQC — works alongside Phantom-Step Cascade encryption layers
🧩 Unlock Modes
Server-assisted unlock
A server may optionally store the real nonce and release it after a predefined time condition.
Offline unlock
The container can also be unlocked by discovering the nonce through brute-force search.
🧪 Potential Use Cases
- cryptographic time capsules
- delayed secret release
- long-term encrypted archives
- experimental time-lock encryption systems
📦 Download
SecretMemoryLocker-4.05-Windows-Portable.exe
📥 SecretMemoryLocker-4.05-Windows.zip
SecretML v4.03
SecretMemoryLocker v4.03
What's New in v4.03 — Phantom-Step Cascade Key Derivation
🔑 Phantom-Step Cascade — Deterministic Final Key Generation
SecretMemoryLocker v4.03 introduces an enhanced key derivation model based on a chained Argon2 cascade.
Core idea:
- Initial seed:
k = file_hash_seed - Each secret answer is processed sequentially
- Every step re-derives the key using the previous result as salt
- Final output becomes the deterministic
final_key
Conceptually:
k = file_hash_seed
for answer in answers:
k = Argon2(answer, salt=k)
final_key = k🛡 What This Achieves
- Multi-layer entropy amplification
- Order-dependent cryptographic strengthening
- No stored master key
- Deterministic and reproducible recovery
This update strengthens resistance against brute-force and structural attacks while preserving full recoverability.
SecretML v4.02
🚀 SecretMemoryLocker v4.02 — The Cognitive Challenge Update
🧠 The Interactive Defense: "Mind-over-Machine"
Version 4.02 introduces a paradigm shift in user authentication. Instead of static passwords, SecretML now utilizes Cognitive Entropy through an interactive challenge-response protocol.
🎭 New Feature: The Vault Quest
We’ve included a pre-configured challenge to demonstrate our Tri-State Security Logic. Can you distinguish the truth from the mirage?
How to test:
- Download the release and locate the
/Vaultfolder. - Launch the app and click the "Decrypt" button.
- Select
quest_protocol.jsonand then selectSecretML_Vault.zip. - Navigate the three-step cognitive filter:
- Truth Path: Enter 100% accurate data to access the authentic
license.txt. - Decoy Path: Enter "plausible" decoy answers to trigger a Plausible Deniability event. You'll unlock a Honey-pot file, designed to mislead intruders.
- MirageLoop: Any other input leads to an infinite processing loop — wasting an attacker's time without giving away a single bit of error data.
- Truth Path: Enter 100% accurate data to access the authentic
💡 SecretMemoryLocker — Where memory becomes a labyrinth and security is absolute.
📦 Download
SecretML v4.02 (Portable EXE)
📥 Download for Windows: SecretML v4.02.zip
Note: Extract the full ZIP archive to ensure the
/Vaultfolder is accessible for the challenge.
SecretML v3.15
🚀 What's New in v3.15 — Memory-Sync & Chained Recovery
🧠 Memory-Sync (Derived Access Key)
SecretML can now derive and securely store a session master key based on your answers — without ever saving the answers themselves.
- One non-reversible 256-bit Master-Hash
- Stored securely in the system keyring
- Enables instant access to multiple archives without re-entering answers
🔐 Per-Archive Unique Encryption
Every encrypted file receives its own unique password, even within the same session.
- Archive key =
SHA256(MasterHash + FileHash) - File hash is stored in archive metadata (comment)
- No two archives ever share the same encryption key
⛓ Chained Recovery (Memory Path Protection)
Access to the Master-Key is protected by a recursive question–answer chain.
- Each answer decrypts the next step
- No visible structure or plaintext questions
- Partial knowledge is useless
You don’t enter a password —
you unlock your own memory.
🛡 Zero-Knowledge Security Model
- Answers are never stored
- Only derived hashes exist
- Keyring data can be wiped instantly via UI
🧨 Instant Access Revocation
Removing archive metadata immediately breaks access —
even if the Master-Key still exists.
A true cryptographic kill-switch.
🧪 Status
- Stable Windows build
- No KDF (test version)
- Ready for real-world usage & testing
📦 Download
SecretML v3.15.exe
Memory-based encryption.
No passwords. No files. No traces.
Secret Memory Locker - v3.10
🚀 What's New in v3.10 — Enhanced SML-Seed & AI Security Core
🌱 Improved SML-Seed 24 Generation
Your 24-word seed phrases are now stronger and more reliable.
Enhancements:
- Increased entropy when generating SML-Seed 24 from archive data.
- More chaotic internal parameters for higher resistance to pattern analysis.
- Fixed multiple bugs related to edge-case seed reconstruction.
🤖 Expanded AI Question Engine
Security questions now provide deeper variability and stronger protection.
Upgrades:
- Larger internal AI dataset for question generation.
- More unique and less predictable question patterns.
- Better personalization without reducing security.
🛡 PRO Mode — Update Availability Checker
PRO users now see in-app version availability and get notified when a new SML release is published.
✅ Download SecretML v3.10
SML v3.10.zip
This update focuses on improving reliability, entropy, and long-term recoverability of your encrypted data.
SecretML v3.09
🚀 What's New in v3.09 — Memory Echo Password Generator (PRO)
🧠 Memory Echo Password Generator (PRO)
Generate infinite passwords dynamically — without ever storing them.
How it works:
- Combines your secret answers + the encrypted file hash (as salt).
- Produces unique, instantly reproducible passwords for any resource.
Steps to use:
- Activate PRO mode.
- Select your
*_SMLkey.jsonkey-file. - Answer your secret questions.
- Enter the resource name (e.g.
GMAIL.COM,FACEBOOK.COM). - Get your password instantly.
🔐 Password Formats
- SHA-256 (64 chars) — maximum entropy, hexadecimal string.
- SML-Echo (32 chars) — mix of uppercase, lowercase, numbers.
📌 Key Rules for Resource Names
- Exact input matters — same name = same password, even small changes break consistency.
- Case insensitive —
facebook.com=FACEBOOK.COM. - Keep it simple — e.g. use just
GMAIL.COM.
🛡 Why Memory Echo?
- On-the-fly — passwords never stored, exist only during generation.
- Offline mode — once activated, no internet is needed.
- Total control — only you, with answers + key-file, can restore passwords.
💡 Pro Tip: Use Memory Echo to create your master password (e.g. for Google Account).
This ensures guaranteed recovery and unbreakable security for your entire digital life.
SecretML v3.07
🚀 What's New in v3.07 — SML-AutoPIN
Secret Memory Locker v3.07 introduces the groundbreaking SML-AutoPIN feature:
🔐 SML-AutoPIN
- Unlimited passwords — no need to memorize or manage them manually.
- Simply choose a file — the app will securely archive it with a unique, automatically generated password.
- To decrypt, just select the archive and instantly recover your file.
This marks a new step towards effortless, memory-powered encryption.