The Digital Bill of Rights
In the Citadel, privacy is not a feature—it is a mathematical certainty. This document outlines the forensic protocols governing your data sovereignty.
1. Data Non-Persistence Protocol
Unlike traditional social platforms, we do not 'collect' data; we facilitate encrypted storage. Your PII (Personally Identifiable Information) is sharded and encrypted at the edge. We maintain zero plaintext records of your private interactions, metadata, or search history.
$pii_blob = sodium_crypto_aead_xchacha20poly1305_ietf_encrypt($raw_data, $ad, $nonce, $user_key);
unset($raw_data);
$master_key = sodium_crypto_pwhash($opslimit, $memlimit, $salt, $password);
// ACCESS: DENIED_BY_MATH
2. Cryptographic Sovereignty
Every byte of your data is locked with XChaCha20-Poly1305. The master keys are derived from your high-entropy password using Argon2id. Because we utilize client-side derivation principles, the Citadel Authority possesses no 'Master Key' to unlock your vault.
4. Legal Compliance & Forensic Disclosure
The Citadel is a harbor for privacy, not a shield for illicit activity. While we are mathematically incapable of providing plaintext message content due to our Zero-Knowledge architecture, we will comply with verified lawful court orders and subpoenas regarding system metadata (IP addresses, access timestamps, and telemetry) to ensure the safety and integrity of the grid.
Warrant Canary
AS OF 2026-04-13, THE CITADEL HAS RECEIVED ZERO (0) NATIONAL SECURITY LETTERS, GAG ORDERS, OR SECRET ACCESS REQUESTS.
KEY_STATUS: DECRYPTED_IN_RAM
5. Zero-Knowledge Messaging Architecture
Direct and Group communications within the Citadel utilize a Tri-Key Handshake. Messages are encrypted at the edge using a unique token known only to the authorized recipients. Because the Citadel does not store these keys, we have zero technical capacity to intercept, monitor, or decrypt your private packets.
Forensic Data Specifications
HMAC-SHA256 (Blind Indexing)
Encrypted Sharding
720 Hours (Rolling Purge)