How It Works

Three Words. Infinite Security.

Behind those simple words is a sophisticated system combining cryptographic security, mathematical precision, and human-friendly design.

3 Seconds

Verification takes moments

Any Channel

Works on calls, texts, email

Zero Memory

Nothing to memorize

100% Offline

Codes never transmitted

Simple for You, Impossible for Attackers

1

Connect Once

Exchange encrypted invitations with people you trust. This one-time setup creates a secure vault between you.

2

Generate Codes

Your app generates three memorable words daily. Each word combination is unique to each relationship.

3

Verify Instantly

When someone contacts you for something sensitive, simply ask: "What's your code?" Three matching words = verified.

The Science

Why Words Beat Numbers

Your brain processes words differently than digits. Here's why that matters for security.

847291

Six-Digit Codes

  • Abstract symbols — hard to retain under pressure
  • Only 1 million combinations (10⁶)
  • Easy to mishear over phone: "Was that 5 or 9?"
  • No mental images to anchor memory

Mountain. Coffee. Bicycle.

Three-Word Codes

  • Creates vivid mental images — easy to remember
  • 8.5 billion combinations (2,048³)
  • Pronounceable and clear on any channel
  • Works in multiple languages

Each word is selected from a curated list of 2,048 common English words designed to be easy to pronounce, spell, and distinguish.

The Math

8,589,934,592 Reasons You're Safe

2,048

words

×
2,048

words

×
2,048

words

=
8.5B

combinations

99 days

To brute-force at 1,000 guesses/sec

But the code changes every 24 hours

0.000000012%

Chance of guessing correctly

Like winning the lottery twice in a row

24 hours

Code rotation

Overheard codes expire quickly

Security Architecture

Defense in Depth

Multiple layers of protection ensure that even if one layer is compromised, your security remains intact.

End-to-End Encryption

Your secrets are encrypted with keys only your devices hold. Even we cannot see them.

Biometric Protection

Face ID, Touch ID, or PIN required. Your codes stay locked behind your identity.

Device Secure Enclave

Private keys stored in iOS/Android secure hardware. Never uploaded, never exposed.

Zero-Knowledge Architecture

We cannot generate your codes, see your secrets, or know who you verify. Privacy by design.

What if Trusted Codes gets hacked?

Even if our servers are completely compromised, attackers get only encrypted data they cannot decrypt. Your private keys never leave your device. Your secrets remain yours.

A server breach is irrelevant to your security.

Comparison

How We Compare

FeatureSMS 2FAAuthenticator AppsTrusted Codes
Interception RiskHigh (SIM swapping)LowImpossible (offline)
Network RequiredYesNoNo
Phishing ProtectionVulnerableLimitedResistant
Use CaseWebsite loginWebsite loginPerson-to-person
Combinations10⁶ (1M)10⁶ (1M)2³³ (8.5B)
Human-ReadableNo (837492)No (837492)Yes (forest eagle mountain)

Ready to protect what matters?

Join the waitlist for early access. Free for families. Enterprise pricing for businesses.