Skip to content

Releases: SecretML/SecretMemoryLocker

SML v4.08

15 Apr 06:57
23e4dc2

Choose a tag to compare

MemoryEcho — Dual Key Output

MemoryEcho now provides two distinct key outputs during reconstruction.

New capabilities:

  • PSQ Key — dynamic key derived from the current archive context
  • Memory-Derived Key — stable key based purely on your answers

The Memory-Derived Key:

  • remains identical across all versions and encryptions
  • depends only on your answers
  • acts as a persistent identity-level cryptographic root

🍏 Experimental: Memory-Derived Apple Identity (MDAI)

New experimental feature available for testing.

Concept:

  • Regenerate Apple credentials deterministically from memory

Supports:

  • iPhone passcode
  • Apple ID
  • FileVault

Key idea:

A single memory-derived key → full identity reconstruction

  • No backups
  • No storage
  • No cloud dependency

📦 Download

Windows 10+

SML-4.08-Windows-Portable.exe

📥 SML-4.08-Windows.zip

https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.08/SML-4.08-Windows.zip

SML v4.07

09 Apr 04:25
8c04937

Choose a tag to compare

🧠 MemoryEcho — Secure Derived Key Display

Secure handling of the memory-derived key during reconstruction.

Improvements:

  • Controlled visibility of the derived key (no persistent exposure)
  • Reduced risk of accidental disclosure during generation
  • Safer interaction model for sensitive cryptographic output

🔐 PassEcho Mode — Standalone Key Generation Container

New standalone mode for secure key generation.

Features:

  • Create a separate encrypted container
  • Works as an independent master key generator
  • No dependency on the main archive after creation
  • Designed for portable and isolated usage

🎭 Hardened Decoy Layers

Decoy protection has been significantly upgraded.

Enhancements:

  • All decoy layers are now encrypted and obfuscated
  • Impossible to reliably distinguish real vs decoy data
  • Stronger plausible deniability in real-world scenarios

⚙️ Selectable Key Reconstruction Mode (V4 / V5)

Full control over key derivation logic.

Capabilities:

  • Choose between V4 (Sequential Argon2 Chain)
  • Or V5 (Stateful Memory-Hard Cascade)
  • Enables compatibility, testing, and security tuning

💡 This release focuses on stronger isolation, better control over sensitive outputs, and deeper cryptographic flexibility.


📦 Download

Windows 10+

SML-4.07-Windows-Portable.exe

📥 SML-4.07-Windows.zip

https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.07/SML-4.07-Windows.zip

SML v4.06

02 Apr 06:00
cb5418b

Choose a tag to compare

What's New in v4.06 — Stability & UI Improvements

🎨 Improved Shortcut Icon Design

Cleaner and more refined icons for a better visual experience.

🛠 Bug Fixes

  • Fixed several minor issues affecting usability.

⚙️ Stability Improvements

  • Enhanced overall application stability and performance.

📦 Download

Windows 10+

SecretMemoryLocker-4.06-Windows-Portable.exe

📥 SML-4.06-Windows.zip

https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.06/SML-4.06-Windows.zip

SecretML v4.05

13 Mar 11:44
fe74338

Choose a tag to compare

What's New in v4.05 — TIMELOCK v1 (PSQC Chronos Protocol)

⏳ TIMELOCK v1 (Chronos Protocol) — Nonce-Based Cryptographic Time Delay

🔐 SecretMemoryLocker v4.05 introduces TIMELOCK v1, an experimental time-delay mechanism for PSQC (Phantom-Step Cascade Container).

This feature turns a randomly generated nonce into a computational time source, creating a cryptographic time capsule effect.

Instead of storing the real nonce, the PSQC container stores only its hash:

PSQC:{
  "nonce_hint": "LEdWTvvka9******",
  "nonce_hash_V1": "48d49beb8cbb82c65d1009fbcbc22c70c1a3dad87a7558b932dfb97ec4f3b928",
  "ciphertext": "Argon2id(secret = nonce, salt = file_hash → Layer0 : base64_payload_data..."
}

To unlock the container, the system must discover the nonce such that:
SHA256(nonce) == nonce_hash_V1

Once the correct nonce is found, it becomes the secret input for key derivation:

Phantom-Step Cascade (nonce-seeded)

nonce

KDF₀ = Argon2(nonce, salt₀)

Decrypt Layer₀ → data₀

KDF₁ = Argon2(data₀, salt₁)

Decrypt Layer₁ → data₁


...


Final Payload (final key + real data)

The derived key decrypts the container using ChaCha20-Poly1305.


⚙️ Core Properties

  • Computational Time Delay — nonce search space defines unlock time
  • Memory-Hard Verification — Argon2id significantly increases brute-force cost
  • Server-Optional Architecture — server may store only the nonce (not encrypted data)
  • Offline Recovery Possible — nonce can be discovered through computation
  • Integrated with PSQC — works alongside Phantom-Step Cascade encryption layers

🧩 Unlock Modes

Server-assisted unlock

A server may optionally store the real nonce and release it after a predefined time condition.

Offline unlock

The container can also be unlocked by discovering the nonce through brute-force search.


🧪 Potential Use Cases

  • cryptographic time capsules
  • delayed secret release
  • long-term encrypted archives
  • experimental time-lock encryption systems

📦 Download

Windows 10+

SecretMemoryLocker-4.05-Windows-Portable.exe

📥 SecretMemoryLocker-4.05-Windows.zip

https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.05/SecretMemoryLocker-4.05-Windows.zip

SecretML v4.03

01 Mar 06:45
40af4fa

Choose a tag to compare

SecretMemoryLocker v4.03

What's New in v4.03 — Phantom-Step Cascade Key Derivation

🔑 Phantom-Step Cascade — Deterministic Final Key Generation

SecretMemoryLocker v4.03 introduces an enhanced key derivation model based on a chained Argon2 cascade.

Core idea:

  • Initial seed: k = file_hash_seed
  • Each secret answer is processed sequentially
  • Every step re-derives the key using the previous result as salt
  • Final output becomes the deterministic final_key

Conceptually:

k = file_hash_seed

for answer in answers:
    k = Argon2(answer, salt=k)

final_key = k

🛡 What This Achieves

  • Multi-layer entropy amplification
  • Order-dependent cryptographic strengthening
  • No stored master key
  • Deterministic and reproducible recovery

This update strengthens resistance against brute-force and structural attacks while preserving full recoverability.

SecretML v4.02

24 Feb 09:55
d484de5

Choose a tag to compare

🚀 SecretMemoryLocker v4.02 — The Cognitive Challenge Update

🧠 The Interactive Defense: "Mind-over-Machine"

Version 4.02 introduces a paradigm shift in user authentication. Instead of static passwords, SecretML now utilizes Cognitive Entropy through an interactive challenge-response protocol.


🎭 New Feature: The Vault Quest

We’ve included a pre-configured challenge to demonstrate our Tri-State Security Logic. Can you distinguish the truth from the mirage?

How to test:

  1. Download the release and locate the /Vault folder.
  2. Launch the app and click the "Decrypt" button.
  3. Select quest_protocol.json and then select SecretML_Vault.zip.
  4. Navigate the three-step cognitive filter:
    • Truth Path: Enter 100% accurate data to access the authentic license.txt.
    • Decoy Path: Enter "plausible" decoy answers to trigger a Plausible Deniability event. You'll unlock a Honey-pot file, designed to mislead intruders.
    • MirageLoop: Any other input leads to an infinite processing loop — wasting an attacker's time without giving away a single bit of error data.

💡 SecretMemoryLocker — Where memory becomes a labyrinth and security is absolute.

📦 Download

Windows 10+

SecretML v4.02 (Portable EXE)

📥 Download for Windows: SecretML v4.02.zip

Note: Extract the full ZIP archive to ensure the /Vault folder is accessible for the challenge.

SecretML v3.15

05 Feb 09:17
c3a7e41

Choose a tag to compare

🚀 What's New in v3.15 — Memory-Sync & Chained Recovery

🧠 Memory-Sync (Derived Access Key)

SecretML can now derive and securely store a session master key based on your answers — without ever saving the answers themselves.

  • One non-reversible 256-bit Master-Hash
  • Stored securely in the system keyring
  • Enables instant access to multiple archives without re-entering answers

🔐 Per-Archive Unique Encryption

Every encrypted file receives its own unique password, even within the same session.

  • Archive key = SHA256(MasterHash + FileHash)
  • File hash is stored in archive metadata (comment)
  • No two archives ever share the same encryption key

⛓ Chained Recovery (Memory Path Protection)

Access to the Master-Key is protected by a recursive question–answer chain.

  • Each answer decrypts the next step
  • No visible structure or plaintext questions
  • Partial knowledge is useless

You don’t enter a password —
you unlock your own memory.


🛡 Zero-Knowledge Security Model

  • Answers are never stored
  • Only derived hashes exist
  • Keyring data can be wiped instantly via UI

🧨 Instant Access Revocation

Removing archive metadata immediately breaks access —
even if the Master-Key still exists.

A true cryptographic kill-switch.


🧪 Status

  • Stable Windows build
  • No KDF (test version)
  • Ready for real-world usage & testing

📦 Download

SecretML v3.15.exe

SML v3.15.zip

Memory-based encryption.
No passwords. No files. No traces.

Secret Memory Locker - v3.10

16 Nov 04:33
bb460ef

Choose a tag to compare

🚀 What's New in v3.10 — Enhanced SML-Seed & AI Security Core

🌱 Improved SML-Seed 24 Generation

Your 24-word seed phrases are now stronger and more reliable.

Enhancements:

  • Increased entropy when generating SML-Seed 24 from archive data.
  • More chaotic internal parameters for higher resistance to pattern analysis.
  • Fixed multiple bugs related to edge-case seed reconstruction.

🤖 Expanded AI Question Engine

Security questions now provide deeper variability and stronger protection.

Upgrades:

  • Larger internal AI dataset for question generation.
  • More unique and less predictable question patterns.
  • Better personalization without reducing security.

🛡 PRO Mode — Update Availability Checker

PRO users now see in-app version availability and get notified when a new SML release is published.


✅ Download SecretML v3.10
SML v3.10.zip


This update focuses on improving reliability, entropy, and long-term recoverability of your encrypted data.

SecretML v3.09

24 Sep 08:55
88fec5e

Choose a tag to compare

🚀 What's New in v3.09 — Memory Echo Password Generator (PRO)

🧠 Memory Echo Password Generator (PRO)

Generate infinite passwords dynamically — without ever storing them.

How it works:

  • Combines your secret answers + the encrypted file hash (as salt).
  • Produces unique, instantly reproducible passwords for any resource.

Steps to use:

  1. Activate PRO mode.
  2. Select your *_SMLkey.json key-file.
  3. Answer your secret questions.
  4. Enter the resource name (e.g. GMAIL.COM, FACEBOOK.COM).
  5. Get your password instantly.

🔐 Password Formats

  • SHA-256 (64 chars) — maximum entropy, hexadecimal string.
  • SML-Echo (32 chars) — mix of uppercase, lowercase, numbers.

📌 Key Rules for Resource Names

  • Exact input matters — same name = same password, even small changes break consistency.
  • Case insensitivefacebook.com = FACEBOOK.COM.
  • Keep it simple — e.g. use just GMAIL.COM.

🛡 Why Memory Echo?

  • On-the-fly — passwords never stored, exist only during generation.
  • Offline mode — once activated, no internet is needed.
  • Total control — only you, with answers + key-file, can restore passwords.

💡 Pro Tip: Use Memory Echo to create your master password (e.g. for Google Account).
This ensures guaranteed recovery and unbreakable security for your entire digital life.


SecretML v3.07

17 Sep 09:42
314a61e

Choose a tag to compare

🚀 What's New in v3.07 — SML-AutoPIN

Secret Memory Locker v3.07 introduces the groundbreaking SML-AutoPIN feature:

🔐 SML-AutoPIN

  • Unlimited passwords — no need to memorize or manage them manually.
  • Simply choose a file — the app will securely archive it with a unique, automatically generated password.
  • To decrypt, just select the archive and instantly recover your file.

This marks a new step towards effortless, memory-powered encryption.