The Digital Bill of Rights

In the Citadel, privacy is not a feature—it is a mathematical certainty. This document outlines the forensic protocols governing your data sovereignty.

1. Data Non-Persistence Protocol

Unlike traditional social platforms, we do not 'collect' data; we facilitate encrypted storage. Your PII (Personally Identifiable Information) is sharded and encrypted at the edge. We maintain zero plaintext records of your private interactions, metadata, or search history.

> INTERNAL_LOGIC_PREVIEW $pii_blob = sodium_crypto_aead_xchacha20poly1305_ietf_encrypt($raw_data, $ad, $nonce, $user_key);
unset($raw_data);
> KEY_DERIVATION_PROTOCOL $master_key = sodium_crypto_pwhash($opslimit, $memlimit, $salt, $password);
// ACCESS: DENIED_BY_MATH

2. Cryptographic Sovereignty

Every byte of your data is locked with XChaCha20-Poly1305. The master keys are derived from your high-entropy password using Argon2id. Because we utilize client-side derivation principles, the Citadel Authority possesses no 'Master Key' to unlock your vault.

4. Legal Compliance & Forensic Disclosure

The Citadel is a harbor for privacy, not a shield for illicit activity. While we are mathematically incapable of providing plaintext message content due to our Zero-Knowledge architecture, we will comply with verified lawful court orders and subpoenas regarding system metadata (IP addresses, access timestamps, and telemetry) to ensure the safety and integrity of the grid.

Warrant Canary

AS OF 2026-04-13, THE CITADEL HAS RECEIVED ZERO (0) NATIONAL SECURITY LETTERS, GAG ORDERS, OR SECRET ACCESS REQUESTS.

STATUS: HIGH_CLEARANCE

KEY_STATUS: DECRYPTED_IN_RAM

Packet_State XCHACHA20_AEAD_PAYLOAD
Key_Location VOLATILE_CLIENT_RAM
Server_Visibility ZERO_KNOWLEDGE_BLIND

5. Zero-Knowledge Messaging Architecture

Direct and Group communications within the Citadel utilize a Tri-Key Handshake. Messages are encrypted at the edge using a unique token known only to the authorized recipients. Because the Citadel does not store these keys, we have zero technical capacity to intercept, monitor, or decrypt your private packets.

Forensic Data Specifications

Identity Hashing:

HMAC-SHA256 (Blind Indexing)

Storage Architecture:

Encrypted Sharding

Log Retention:

720 Hours (Rolling Purge)