Security

Effective date: 2026-02-15

Setfeed is designed so message content does not need to be readable by Setfeed servers. When encrypted delivery is used, the web bridge (setfeed.app) acts as a ciphertext transport layer.

Responsible disclosure: security@setfeed.app

Threat model (plain language)

Encryption boundary

Messages sent through setfeed.app are encrypted in your browser before they reach our servers. When encrypted delivery is used, Setfeed stores and transports only encrypted ciphertext (plus required cryptographic metadata such as IV and salt).

What Setfeed can and cannot see

Keys

Private encryption keys are stored only on recipient devices and are never intentionally uploaded to Setfeed servers. This is an explicit boundary: the system is built so Setfeed does not need access to your private keys to deliver encrypted envelopes.

Attachments (images)

When image attachments are supported for a message flow, Setfeed stores encrypted attachment bytes and delivers them alongside the encrypted envelope. Attachments are intended to follow the same boundary as message text: encrypted client-side, stored as ciphertext-only, and decrypted on the recipient device.

Integrity and abuse prevention

To reduce automated abuse, Setfeed can use Firebase App Check. On Android, App Check can use Play Integrity; on the web bridge it can use reCAPTCHA. These systems may process signals and tokens that help verify requests come from an authentic app/browser environment.

Backend protections

Reporting a vulnerability

If you believe you’ve found a security issue, email security@setfeed.app. Please include steps to reproduce, impact, and (if possible) a minimal proof of concept.

Changes to this page

If we change this page, we will update the effective date above and publish the updated version here.