The 5 Security Features Every Crypto User Needs
(And Only One App Has)
End-to-end encryption is the bare minimum. If someone can physically force you to unlock your phone, encryption alone won't save you. Here are the five layers that actually matter.
Let's start with something most people get wrong: end-to-end encryption is not security. It's the starting line.
Encryption protects your messages while they travel across the internet. But it does nothing — absolutely nothing — if someone is standing over you demanding that you unlock your phone. It does nothing if your device is stolen. It does nothing if someone screenshots your chat. It does nothing if your encrypted backup leaks.
Real security for crypto users has to go much further. Here are the five features that actually cover the threats you face in the real world.
1. GhostWire — Hide What Exists
The first problem with most messaging apps isn't that your messages can be read. It's that simply opening the app reveals who you talk to, what groups you're in, and how frequently you communicate.
For a crypto user, that contact list is a roadmap. Someone who knows you're in contact with a whale wallet or a specific trading group has learned something useful — and dangerous.
GhostWire solves this by hiding your contacts and chats behind a secondary PIN. Open Sync normally and you see your real app. Anyone else who opens it — or anyone watching over your shoulder — sees nothing sensitive. Your real network is invisible unless you choose to reveal it.
"The most dangerous thing you can reveal isn't your balance. It's who you're connected to."
This matters especially in environments where social engineering is common — conferences, public spaces, and anywhere you might be watched.
2. Duress PIN — Show Them a Lie
The $5 wrench attack is not a theoretical threat. People are physically coerced into unlocking their devices. It happens to crypto holders more than the mainstream press reports, because most victims stay quiet.
No amount of encryption protects you when the person demanding access is in the same room as you.
A Duress PIN is a second PIN — different from your real one — that unlocks a completely sanitised version of your app. Fake contacts. Empty wallet. No sensitive groups. To someone looking at the screen, the app looks real and normal. But none of your actual data is visible.
The person coercing you sees what looks like compliance. Your real data is completely untouched.
This is a feature that should exist on every crypto app. Almost none of them have it.
3. Kill Switch — Wipe It Remotely
Your phone gets stolen. Or seized at a border. Or left somewhere you can't retrieve it. In any of these scenarios, the question becomes: how quickly can you make that device useless to anyone who has it?
A Kill Switch lets a trusted contact — someone you designate in advance — remotely trigger a complete wipe of your Sync account. Everything gone. Messages, contacts, wallet access, everything. Even if the device is offline, the wipe queues and executes the moment it reconnects.
This is not the same as remote device wipe through your phone's OS settings. That's a nuclear option that requires account access. The Sync Kill Switch is specifically for your Sync account and can be triggered by someone else on your behalf — useful if you're incapacitated or under duress.
4. Obsidian Core — Backups That We Can't Read
Most app backups are a liability. Your cloud provider can read them. Governments can subpoena them. Hackers who compromise the backup server can access them.
The Obsidian Core is a zero-knowledge encrypted backup. Your entire chat history and app state is encrypted on your device before it ever leaves. The encryption key never reaches our servers. We store a locked box — and we have no idea what's inside it.
This means you get the convenience of cloud backup with the security of local-only storage. You can restore your full account to a new device — and Sync itself cannot read a single message in the process.
5. Aegis Shield — Lock the Screen Itself
You're in a private conversation. Someone sits next to you. Or a group call is happening and someone shares their screen. Or you hand your phone to someone to show them one thing and they start scrolling.
Aegis Shield blocks screenshots and screen recording at the OS level while Sync is open. The app cannot be captured by any screen recording software, third-party apps, or the native screenshot function. What you see on the screen stays on the screen.
This is particularly important for crypto users who share device access in trusted environments — family members, assistants, colleagues — where you don't want a careless screenshot to expose your wallet or your private conversations.
Why These Five Together
Each of these features addresses a different threat vector:
- GhostWire protects against passive surveillance — someone looking at your phone without permission
- Duress PIN protects against active coercion — someone forcing you to unlock
- Kill Switch protects against device loss or seizure — when you can no longer control the hardware
- Obsidian Core protects against backup compromise — when the data itself is targeted
- Aegis Shield protects against visual capture — screenshots and recordings in your presence
End-to-end encryption covers the wire. These five features cover everything else.
Until Sync, you couldn't get all five of these in a single app. You couldn't get most of them in any consumer messaging app at all.
Crypto users operate with different risk profiles than the average person. The security tools you use should understand that — and rise to meet it.
All Five Layers. Free During Public Beta.
GhostWire, Duress PIN, Kill Switch, Obsidian Core, and Aegis Shield — plus the full crypto wallet and Oracle AI. Free to join today.
Join the BetaMore from the Blog
Why Telegram Groups Are Not Actually Encrypted
Millions of crypto users trust Telegram with their most sensitive conversations. Here's what Telegram's own documentation quietly admits.
What Is a Duress PIN and Why Every Crypto Holder Needs One
Physical coercion is a real threat. A Duress PIN is the answer most people have never heard of.