Effective date: 2026-02-15
Setfeed is designed so message content does not need to be readable by Setfeed servers. When encrypted delivery is used, the web bridge (setfeed.app) acts as a ciphertext transport layer.
Responsible disclosure: security@setfeed.app
Messages sent through setfeed.app are encrypted in your browser before they reach our servers. When encrypted delivery is used, Setfeed stores and transports only encrypted ciphertext (plus required cryptographic metadata such as IV and salt).
Private encryption keys are stored only on recipient devices and are never intentionally uploaded to Setfeed servers. This is an explicit boundary: the system is built so Setfeed does not need access to your private keys to deliver encrypted envelopes.
When image attachments are supported for a message flow, Setfeed stores encrypted attachment bytes and delivers them alongside the encrypted envelope. Attachments are intended to follow the same boundary as message text: encrypted client-side, stored as ciphertext-only, and decrypted on the recipient device.
To reduce automated abuse, Setfeed can use Firebase App Check. On Android, App Check can use Play Integrity; on the web bridge it can use reCAPTCHA. These systems may process signals and tokens that help verify requests come from an authentic app/browser environment.
If you believe you’ve found a security issue, email security@setfeed.app. Please include steps to reproduce, impact, and (if possible) a minimal proof of concept.
If we change this page, we will update the effective date above and publish the updated version here.