Return to WH15P3R

WH15P3R

User Security Guide · Post-Quantum Edition
PURPOSE This guide explains how to use WH15P3R securely based on your threat level. Not all users face the same risks. Choose the appropriate security measures for your situation.

UNDERSTANDING YOUR THREAT LEVEL

Select the security approach that matches your risk profile:

LOW RISK MEDIUM RISK HIGH RISK EXTREME RISK

LEVEL 1: BASIC SECURITY

LOW RISK

Who This Is For

Quick Start

  1. Use a modern browser: Chrome 142+, Edge 142+, or Firefox 120+
  2. Visit: wh15p3r.link
  3. Look for: POST-QUANTUM READY
  4. Confirm VPN/Tor usage: Check the security confirmation box
  5. Click: "Text only" to generate session code
  6. Share code with your contact via separate channel
  7. Verify: Status shows PQ SECURE
  8. Chat safely: Messages are quantum-resistant encrypted
  9. End session: Close browser when finished
✓ PROTECTED AGAINST • Commercial data harvesting
• ISP surveillance
• Network eavesdropping
• Future quantum computers

LEVEL 2: ENHANCED SECURITY

MEDIUM RISK

Who This Is For

Additional Requirements

Browser & Network Protection

RECOMMENDED: Use Tor Browser for maximum privacy Download: torproject.org
Benefit: Hides your IP address from both server and chat partner

Alternative: Use VPN (ProtonVPN, Mullvad, IVPN)

Session Code Verification (CRITICAL)

When you generate a session code, you must verify it with your contact:

SECURITY CHECK: Verify session code out-of-band

For maximum security:
• Call your contact on a separate phone
• Verbally confirm the session code matches
• Or exchange codes in person

Why this matters: Prevents man-in-the-middle attacks

Safe verification methods:

  1. Phone call on different device: Read code aloud, confirm it matches
  2. In-person exchange: Show codes on screens, verify they match
  3. Existing secure channel: If you already use Signal securely, that works
⚠ NEVER share session codes via • SMS (not encrypted)
• Email (stored on servers)
• Social media (monitored)
• Insecure messaging apps

Operational Security

✓ ADDITIONALLY PROTECTED AGAINST • Targeted surveillance (moderate)
• Man-in-the-middle attacks (with verification)
• IP address correlation (with Tor/VPN)
• Metadata analysis (reduced)

LEVEL 3: HIGH SECURITY

HIGH RISK

Who This Is For

CRITICAL At this threat level, digital security alone is insufficient. You must combine cryptographic protection with rigorous operational security and physical security measures.

Operating System Requirements

OPTION 1: Tails OS (Recommended for Desktop)

Tails = The Amnesic Incognito Live System

Characteristics:
• Boots from USB drive
• Runs entirely in RAM
• Leaves no traces on computer
• Includes Tor Browser pre-configured
• All data destroyed on shutdown

Download: tails.boum.org
IMPORTANT: Verify cryptographic signature

Usage:

  1. Download Tails and verify signature
  2. Create bootable USB drive
  3. Boot computer from USB (nothing on hard drive)
  4. Access WH15P3R through built-in Tor Browser
  5. Shut down = all traces erased

OPTION 2: GrapheneOS (Mobile)

Access Location Protocol

NEVER access from • Your home
• Your workplace
• Regular locations
• Anywhere with cameras showing your face
• Same location twice

ALWAYS access from:

Session Code Exchange (High Security)

BEST PRACTICE: In-Person Verification

  1. Arrange meeting at random public location
  2. Use counter-surveillance awareness
  3. Exchange codes face-to-face
  4. Verify codes match exactly
  5. Memorize if possible, destroy paper immediately
  6. Leave separately by different routes
  7. Wait 2-6 hours before connecting
  8. Connect from completely different locations

ACCEPTABLE: Burner Phone Voice Call

LEVEL 4: MAXIMUM SECURITY

EXTREME RISK

Reality Check

IF YOU ARE SPECIFICALLY TARGETED BY A WELL-RESOURCED INTELLIGENCE AGENCY No digital communication system—including WH15P3R—can provide complete protection. Adversaries with unlimited resources can:

• Deploy zero-day exploits against any browser
• Compromise devices via supply chain interdiction
• Install hardware-level implants
• Conduct comprehensive physical surveillance
• Use legal coercion or violence

If You Must Communicate Digitally

Hardware Security

Communication Strategy

PRIMARY RULE: Use WH15P3R for meeting coordination only.
          Discuss actual sensitive topics in person.

BROWSER COMPATIBILITY

Post-Quantum Encryption Support

Browser Version Required PQ Status Notes
Chrome 142+ FULL SUPPORT October 2025
Edge 142+ FULL SUPPORT October 2025
Firefox 120+ FULL SUPPORT November 2024
Tor Browser Latest RECOMMENDED Based on Firefox
Brave Latest RECOMMENDED Privacy-focused Chromium

Fallback: Older browsers use strong classical encryption (secure against current threats, not quantum-resistant)

WHAT IS PROTECTED

✓ MESSAGE CONTENT • End-to-end encrypted with post-quantum algorithms
• Protected against future quantum computers
• Cannot be decrypted by anyone (including us)
• Remains secure even if traffic is recorded today
✓ NO DATA STORAGE • No messages stored on any server
• No chat history saved
• No user accounts or registration data
• Server cannot be seized for your data (there is none)
✓ EPHEMERAL SESSIONS • Encryption keys exist only during active session
• Keys destroyed when session ends
• Keys never stored or transmitted to servers
• Cannot be reconstructed after session

WHAT IS NOT PROTECTED

✗ ENDPOINT SECURITY CRITICAL LIMITATION: No encryption can protect compromised devices.

If malware, keyloggers, or screen capture software is on your device:
• Messages are visible before encryption
• Messages are visible after decryption
• Keystrokes can be captured
• Screen content can be recorded

MITIGATION: Use trusted devices, Tails OS, regular security audits
⚠ METADATA LEAKAGE Even with perfect encryption, these are visible:
• IP addresses (unless using Tor)
• Connection times and duration
• Message frequency and sizes
• Communication patterns

MITIGATION: Use Tor Browser, vary patterns, access from different locations
⚠ PHYSICAL ATTACKS No cryptography protects against:
• Physical device seizure
• Coercion or torture
• Legally compelled disclosure
• "Rubber hose cryptanalysis"

MITIGATION: Physical security, legal preparation, secure deletion, plausible deniability

EMERGENCY PROCEDURES

If You Suspect Device Compromise

  1. Immediately: End session, close browser, power off device
  2. Do not turn on again until device can be examined
  3. If high-risk: Destroy device and SIM card
  4. Use different device for future communications
  5. Change all patterns: Timing, locations, contacts

If Arrested or Detained

REMEMBER • Remain silent beyond identifying yourself
• Request lawyer immediately and repeatedly
• Do not consent to device searches
• Do not provide passwords or unlock devices
• Do not explain encryption to authorities
• Do not try to convince them of innocence

FREQUENTLY ASKED QUESTIONS

Q: Is this really quantum-resistant?

A: Yes, when using Chrome 142+, Edge 142+, or Firefox 120+. Uses NIST-standardized ML-KEM (FIPS 203) which is designed to resist attacks from quantum computers.

Q: Can the government read my messages?

A: They cannot decrypt messages in transit, even with quantum computers. However, they CAN read messages if your device is compromised before encryption or after decryption.

Q: Why do I need out-of-band verification?

A: To prevent man-in-the-middle attacks. An attacker could intercept your session code and pose as your contact. Verifying via phone call or in-person ensures you're really talking to who you think you are.

Q: What if I can't use Tor Browser?

A: Use a reputable VPN service. This hides your IP address from the signaling server, though not as effectively as Tor. For high-risk situations, Tor is strongly recommended.

Q: How do I know there's no backdoor?

A: The code is open source and can be audited. We use standard browser cryptography (not custom implementations), which is maintained and audited by browser vendors. Transparency is our security model.

Q: What happens if I lose connection?

A: Session ends and all encryption keys are destroyed. You'll need to start a new session with a new code.

FINAL GUIDANCE

DEFENSE IN DEPTH Layer your security:
1. Secure hardware (Tails, trusted devices)
2. Secure network (Tor, VPN)
3. Secure communication (WH15P3R)
4. Secure behavior (OpSec, tradecraft)
5. Physical security (location, awareness)
6. Legal protection (know rights, have lawyer)

No single layer is sufficient. Use them all.

Trust Your Instincts

If something feels wrong:

Better to be paranoid and safe than trusting and caught.

This is a Tool, Not a Shield

WH15P3R provides strong cryptographic protection. It does NOT make you invincible. Use wisely, understand limitations, combine with other security measures, and always prioritize your physical safety.

STAY SAFE • TRUST CAREFULLY • VERIFY EVERYTHING

Document Version: 2.0 (Post-Quantum Edition)

Last Updated: November 2025

For technical details, see: SECURITY.md in project repository


"The goal is not perfect security—that's impossible. The goal is to make surveillance expensive enough that you're not worth the effort."