Releases: SecretML/SecretMemoryLocker
SML v4.06
What's New in v4.06 — Stability & UI Improvements
🎨 Improved Shortcut Icon Design
Cleaner and more refined icons for a better visual experience.
🛠 Bug Fixes
- Fixed several minor issues affecting usability.
⚙️ Stability Improvements
- Enhanced overall application stability and performance.
📦 Download
SecretMemoryLocker-4.06-Windows-Portable.exe
📥 SML-4.06-Windows.zip
https://github.com/SecretML/SecretMemoryLocker/releases/download/v4.06/SML-4.06-Windows.zip
SecretML v4.05
What's New in v4.05 — TIMELOCK v1 (PSQC Chronos Protocol)
⏳ TIMELOCK v1 (Chronos Protocol) — Nonce-Based Cryptographic Time Delay
🔐 SecretMemoryLocker v4.05 introduces TIMELOCK v1, an experimental time-delay mechanism for PSQC (Phantom-Step Cascade Container).
This feature turns a randomly generated nonce into a computational time source, creating a cryptographic time capsule effect.
Instead of storing the real nonce, the PSQC container stores only its hash:
PSQC:{
"nonce_hint": "LEdWTvvka9******",
"nonce_hash_V1": "48d49beb8cbb82c65d1009fbcbc22c70c1a3dad87a7558b932dfb97ec4f3b928",
"ciphertext": "Argon2id(secret = nonce, salt = file_hash → Layer0 : base64_payload_data..."
}
To unlock the container, the system must discover the nonce such that:
SHA256(nonce) == nonce_hash_V1
Once the correct nonce is found, it becomes the secret input for key derivation:
Phantom-Step Cascade (nonce-seeded)
nonce
↓KDF₀ = Argon2(nonce, salt₀)
↓
Decrypt Layer₀ → data₀
↓KDF₁ = Argon2(data₀, salt₁)
↓
Decrypt Layer₁ → data₁
↓↓
...
↓↓
Final Payload (final key + real data)
The derived key decrypts the container using ChaCha20-Poly1305.
⚙️ Core Properties
- Computational Time Delay — nonce search space defines unlock time
- Memory-Hard Verification — Argon2id significantly increases brute-force cost
- Server-Optional Architecture — server may store only the nonce (not encrypted data)
- Offline Recovery Possible — nonce can be discovered through computation
- Integrated with PSQC — works alongside Phantom-Step Cascade encryption layers
🧩 Unlock Modes
Server-assisted unlock
A server may optionally store the real nonce and release it after a predefined time condition.
Offline unlock
The container can also be unlocked by discovering the nonce through brute-force search.
🧪 Potential Use Cases
- cryptographic time capsules
- delayed secret release
- long-term encrypted archives
- experimental time-lock encryption systems
📦 Download
SecretMemoryLocker-4.05-Windows-Portable.exe
📥 SecretMemoryLocker-4.05-Windows.zip
SecretML v4.03
SecretMemoryLocker v4.03
What's New in v4.03 — Phantom-Step Cascade Key Derivation
🔑 Phantom-Step Cascade — Deterministic Final Key Generation
SecretMemoryLocker v4.03 introduces an enhanced key derivation model based on a chained Argon2 cascade.
Core idea:
- Initial seed:
k = file_hash_seed - Each secret answer is processed sequentially
- Every step re-derives the key using the previous result as salt
- Final output becomes the deterministic
final_key
Conceptually:
k = file_hash_seed
for answer in answers:
k = Argon2(answer, salt=k)
final_key = k🛡 What This Achieves
- Multi-layer entropy amplification
- Order-dependent cryptographic strengthening
- No stored master key
- Deterministic and reproducible recovery
This update strengthens resistance against brute-force and structural attacks while preserving full recoverability.
SecretML v4.02
🚀 SecretMemoryLocker v4.02 — The Cognitive Challenge Update
🧠 The Interactive Defense: "Mind-over-Machine"
Version 4.02 introduces a paradigm shift in user authentication. Instead of static passwords, SecretML now utilizes Cognitive Entropy through an interactive challenge-response protocol.
🎭 New Feature: The Vault Quest
We’ve included a pre-configured challenge to demonstrate our Tri-State Security Logic. Can you distinguish the truth from the mirage?
How to test:
- Download the release and locate the
/Vaultfolder. - Launch the app and click the "Decrypt" button.
- Select
quest_protocol.jsonand then selectSecretML_Vault.zip. - Navigate the three-step cognitive filter:
- Truth Path: Enter 100% accurate data to access the authentic
license.txt. - Decoy Path: Enter "plausible" decoy answers to trigger a Plausible Deniability event. You'll unlock a Honey-pot file, designed to mislead intruders.
- MirageLoop: Any other input leads to an infinite processing loop — wasting an attacker's time without giving away a single bit of error data.
- Truth Path: Enter 100% accurate data to access the authentic
💡 SecretMemoryLocker — Where memory becomes a labyrinth and security is absolute.
📦 Download
SecretML v4.02 (Portable EXE)
📥 Download for Windows: SecretML v4.02.zip
Note: Extract the full ZIP archive to ensure the
/Vaultfolder is accessible for the challenge.
SecretML v3.15
🚀 What's New in v3.15 — Memory-Sync & Chained Recovery
🧠 Memory-Sync (Derived Access Key)
SecretML can now derive and securely store a session master key based on your answers — without ever saving the answers themselves.
- One non-reversible 256-bit Master-Hash
- Stored securely in the system keyring
- Enables instant access to multiple archives without re-entering answers
🔐 Per-Archive Unique Encryption
Every encrypted file receives its own unique password, even within the same session.
- Archive key =
SHA256(MasterHash + FileHash) - File hash is stored in archive metadata (comment)
- No two archives ever share the same encryption key
⛓ Chained Recovery (Memory Path Protection)
Access to the Master-Key is protected by a recursive question–answer chain.
- Each answer decrypts the next step
- No visible structure or plaintext questions
- Partial knowledge is useless
You don’t enter a password —
you unlock your own memory.
🛡 Zero-Knowledge Security Model
- Answers are never stored
- Only derived hashes exist
- Keyring data can be wiped instantly via UI
🧨 Instant Access Revocation
Removing archive metadata immediately breaks access —
even if the Master-Key still exists.
A true cryptographic kill-switch.
🧪 Status
- Stable Windows build
- No KDF (test version)
- Ready for real-world usage & testing
📦 Download
SecretML v3.15.exe
Memory-based encryption.
No passwords. No files. No traces.
Secret Memory Locker - v3.10
🚀 What's New in v3.10 — Enhanced SML-Seed & AI Security Core
🌱 Improved SML-Seed 24 Generation
Your 24-word seed phrases are now stronger and more reliable.
Enhancements:
- Increased entropy when generating SML-Seed 24 from archive data.
- More chaotic internal parameters for higher resistance to pattern analysis.
- Fixed multiple bugs related to edge-case seed reconstruction.
🤖 Expanded AI Question Engine
Security questions now provide deeper variability and stronger protection.
Upgrades:
- Larger internal AI dataset for question generation.
- More unique and less predictable question patterns.
- Better personalization without reducing security.
🛡 PRO Mode — Update Availability Checker
PRO users now see in-app version availability and get notified when a new SML release is published.
✅ Download SecretML v3.10
SML v3.10.zip
This update focuses on improving reliability, entropy, and long-term recoverability of your encrypted data.
SecretML v3.09
🚀 What's New in v3.09 — Memory Echo Password Generator (PRO)
🧠 Memory Echo Password Generator (PRO)
Generate infinite passwords dynamically — without ever storing them.
How it works:
- Combines your secret answers + the encrypted file hash (as salt).
- Produces unique, instantly reproducible passwords for any resource.
Steps to use:
- Activate PRO mode.
- Select your
*_SMLkey.jsonkey-file. - Answer your secret questions.
- Enter the resource name (e.g.
GMAIL.COM,FACEBOOK.COM). - Get your password instantly.
🔐 Password Formats
- SHA-256 (64 chars) — maximum entropy, hexadecimal string.
- SML-Echo (32 chars) — mix of uppercase, lowercase, numbers.
📌 Key Rules for Resource Names
- Exact input matters — same name = same password, even small changes break consistency.
- Case insensitive —
facebook.com=FACEBOOK.COM. - Keep it simple — e.g. use just
GMAIL.COM.
🛡 Why Memory Echo?
- On-the-fly — passwords never stored, exist only during generation.
- Offline mode — once activated, no internet is needed.
- Total control — only you, with answers + key-file, can restore passwords.
💡 Pro Tip: Use Memory Echo to create your master password (e.g. for Google Account).
This ensures guaranteed recovery and unbreakable security for your entire digital life.
SecretML v3.07
🚀 What's New in v3.07 — SML-AutoPIN
Secret Memory Locker v3.07 introduces the groundbreaking SML-AutoPIN feature:
🔐 SML-AutoPIN
- Unlimited passwords — no need to memorize or manage them manually.
- Simply choose a file — the app will securely archive it with a unique, automatically generated password.
- To decrypt, just select the archive and instantly recover your file.
This marks a new step towards effortless, memory-powered encryption.
SecretML v3.05
🚀 What's New in v3.05 — Keyring & Upcoming AutoPIN
Secret Memory Locker v3.05 introduces important updates and upcoming features:
🔑 Keyring Support
- Purchased key management — activate or remove your PRO keys directly in the app.
- Full deletion of key data when removing a key.
- Improved stability and reliability for key handling.
🛠 Improvements
- Several minor bug fixes to enhance overall performance and user experience.
⚡ Upcoming Feature: SML-AutoPIN
- Auto-generated archive passwords — create encrypted archives without entering a password.
- Every archive gets a unique, automatically generated password.
- Functionality under internal testing, coming soon.
SecretML v3.03
🚀 What's New in v3.03 — PRO Mode Upgrades
Secret Memory Locker v3.03 expands the PRO mode with groundbreaking features:
🌱 SecretML-Seed
- SecretML-Seed (12) — A 12-word seed phrase generated entirely from your memories. No physical storage required — your mind becomes the secure vault.
- SecretML-Seed (24) — Maximum entropy with a 24-word seed phrase. Full control, maximum security, and no need to ever write anything down.
🔑 Core Idea
Your memories + your archive generate the final entropy.
This means your security lives only in your head — not on paper, not on devices.
✅ Try the new SecretML-Seed and experience memory-based security!