PM Security Model

Understanding how PM protects your conversations with military-grade encryption and privacy-first design

Security Architecture

PM's security model is built on multiple layers of protection

End-to-End Encryption

All communications are protected with military-grade end-to-end encryption using the Signal Protocol. Only you and your intended recipient can read your messages - not even PM can access them.

Signal Protocol

Industry-standard encryption protocol used by millions worldwide

Perfect Forward Secrecy

New encryption keys for every message, protecting past conversations

Identity Verification

Safety numbers to verify you're talking to the right person

Encryption Flow

1
2
3
4

Message Created

On sender's device

Encrypted

With recipient's key

Transmitted

Through secure channels

Decrypted

Only on recipient's device

Privacy-First Features

Every aspect of PM is designed to protect your privacy

No Server Logs

PM servers never store conversation logs, call logs, or message metadata. Your communications exist only in memory during transmission.

  • Zero conversation storage
  • No call logs
  • Ephemeral message routing

Auto-Delete

Messages automatically delete after logout or configurable inactivity period. You control how long your data exists.

  • Configurable timer
  • On logout deletion
  • Complete data wipe

PIN-Gated Contacts

Contacts are saved as aliases and hidden behind your PIN. No contact discovery without your explicit approval.

  • Alias-based contacts
  • PIN protection
  • Hidden contact list

Mutual Contact Approval

Both parties must approve before a contact is added. No unsolicited contact requests or spam.

  • Dual approval required
  • No unsolicited requests
  • Spam prevention

Device Security

PM leverages your device's built-in security features including secure enclaves and biometric authentication.

  • Secure enclave storage
  • Biometric authentication
  • App sandboxing

Anonymous Usage

No phone number or email required. Create a unique username and PIN for complete anonymity.

  • No phone required
  • No email required
  • Username-based identity

Security Comparison

How PM compares to other messaging platforms

Feature PM Signal WhatsApp Telegram
End-to-End Encryption ✓ Default ✓ Default ✓ Default ⚠ Secret Chats Only
No Server Logs ✓ Yes ✗ Some Metadata ✗ Metadata Stored ✗ Cloud Storage
Auto-Delete Messages ✓ Configurable ✓ Yes ⚠ Limited ✓ Yes
PIN-Gated Contacts ✓ Yes ✗ No ✗ No ✗ No
Mutual Contact Approval ✓ Required ✗ No ✗ No ✗ No
Anonymous Registration ✓ Yes ✗ Phone Required ✗ Phone Required ✗ Phone Required

PM Security Whitepaper

Download our comprehensive security whitepaper for detailed technical specifications and threat model analysis.

50+
Pages of technical details
12
Security controls analyzed
5
Threat scenarios covered

Updated: November 2024 • Version 2.1