License Protection
A modern security model that protects what you bought, without watching what you do with it.
[!] any other computer → blocked
The principles your license is built on
Plain-language commitments — without naming the moving parts that an attacker would benefit from knowing
One license, one machine
Each license attaches to the specific computer you install it on. Stolen license keys can't be used elsewhere.
Sealed end-to-end
Every request between your computer and our servers is wrapped in fresh encryption. Recorded traffic stays unreadable, today and in the future.
Encrypted on your disk
Your license file is encrypted with a key tied to your machine. Copy the file to another computer and it simply doesn't decrypt.
Tamper-aware binary
The application checks its own integrity at startup. A modified copy refuses to run rather than silently misbehave.
Server is the source of truth
Whether your license is valid is decided on our server. Cracked clients can't lie their way past it — they have nothing to lie with.
You can move machines
Switching computers? Re-bind in seconds from the app. Reasonable daily limits prevent abuse without getting in your way.
How it feels for you
What the protection layer means for everyday use
First install
Enter your license. The app binds it to your machine, persists it locally in encrypted form, and you're in. No accounts to remember.
Moving to a new computer
On the new machine, click "Use this license here". The old binding is released, the new one is set, and your work continues.
Sharing it with a friend
It won't work for them. Their machine looks different to our system, so the license refuses to bind there. Friends need their own license.
Lost or stolen license string
Someone copying your license key off your screen gets nothing usable — the key alone doesn't authenticate without the bound machine.
Every request, sealed fresh
A new key is born, used once, and discarded. Watch a single round trip.
Recorded a real request and replayed it later → too old, the one-time key is gone
Changed a byte in the message on the way → seal broken, server drops it
Pretended to be our server → identity didn't match, app refuses to talk
Copied the license string → wrong computer fingerprint, server says no
Used once, then erased
The key that locks your request lives for milliseconds. Then it's gone.
Then it's gone.
What our auth layer doesn't do
Limits we hold ourselves to so you don't have to take our word for it
No browsing history
Our auth layer never sees what you visit, search, or research.
No keystroke or input logging
We don't record what you type into the app or anywhere else on your machine.
No background telemetry
The app doesn't beacon home. It only talks to our servers when it needs to validate your license.
No kernel drivers
Nothing we install runs at the kernel level. Your computer remains your own.
No silent updates
We don't push code to your machine without your knowledge. Updates are explicit.
No silent error reports
When something goes wrong with auth, we don't dump details that someone reading your logs could exploit.
Modern security, by design
The kind of cryptography that protects your messaging app, applied to your license
Modern primitives
Built on the same generation of cryptography behind Signal, WireGuard, and modern TLS. No legacy or home-rolled algorithms.
Fresh keys per request
Each call to our backend uses a one-time encryption key. Compromise of one session can't unlock any other.
Defense in depth
Server pinning, machine binding, encrypted storage, and integrity checks — independent layers, each one doing one job well.
Nothing baked into the binary
Our app doesn't ship with shared secret keys that get extracted on day one. Reverse-engineering the installer doesn't reveal anything reusable.
What we don't claim
A security model only earns trust by being clear about its edges
We don't claim invincibility
No license system is unbreakable forever. Our goal is to make working around the system more expensive than just buying a license.
We don't run as malware
We won't fight a determined attacker with rootkits or anti-debug tricks that compromise your computer. Your machine is yours.
We don't trust the network
Even on a hostile WiFi network, our app won't talk to a fake server pretending to be us. The trust anchor lives in the binary, not in your DNS.
Designed for the long game
A license isn't just a key — it's a relationship between you, your machine, and our service. We protect that relationship with modern cryptography, then stay out of your way.