How It Works
Three Words. Infinite Security.
Behind those simple words is a sophisticated system combining cryptographic security, mathematical precision, and human-friendly design.
3 Seconds
Verification takes moments
Any Channel
Works on calls, texts, email
Zero Memory
Nothing to memorize
100% Offline
Codes never transmitted
Simple for You, Impossible for Attackers
Connect Once
Exchange encrypted invitations with people you trust. This one-time setup creates a secure vault between you.
Generate Codes
Your app generates three memorable words daily. Each word combination is unique to each relationship.
Verify Instantly
When someone contacts you for something sensitive, simply ask: "What's your code?" Three matching words = verified.
The Science
Why Words Beat Numbers
Your brain processes words differently than digits. Here's why that matters for security.
847291
Six-Digit Codes
- Abstract symbols — hard to retain under pressure
- Only 1 million combinations (10⁶)
- Easy to mishear over phone: "Was that 5 or 9?"
- No mental images to anchor memory
Mountain. Coffee. Bicycle.
Three-Word Codes
- Creates vivid mental images — easy to remember
- 8.5 billion combinations (2,048³)
- Pronounceable and clear on any channel
- Works in multiple languages
Each word is selected from a curated list of 2,048 common English words designed to be easy to pronounce, spell, and distinguish.
The Math
8,589,934,592 Reasons You're Safe
words
words
words
combinations
99 days
To brute-force at 1,000 guesses/sec
But the code changes every 24 hours
0.000000012%
Chance of guessing correctly
Like winning the lottery twice in a row
24 hours
Code rotation
Overheard codes expire quickly
Security Architecture
Defense in Depth
Multiple layers of protection ensure that even if one layer is compromised, your security remains intact.
End-to-End Encryption
Your secrets are encrypted with keys only your devices hold. Even we cannot see them.
Biometric Protection
Face ID, Touch ID, or PIN required. Your codes stay locked behind your identity.
Device Secure Enclave
Private keys stored in iOS/Android secure hardware. Never uploaded, never exposed.
Zero-Knowledge Architecture
We cannot generate your codes, see your secrets, or know who you verify. Privacy by design.
What if Trusted Codes gets hacked?
Even if our servers are completely compromised, attackers get only encrypted data they cannot decrypt. Your private keys never leave your device. Your secrets remain yours.
A server breach is irrelevant to your security.
Comparison
How We Compare
| Feature | SMS 2FA | Authenticator Apps | Trusted Codes |
|---|---|---|---|
| Interception Risk | High (SIM swapping) | Low | Impossible (offline) |
| Network Required | Yes | No | No |
| Phishing Protection | Vulnerable | Limited | Resistant |
| Use Case | Website login | Website login | Person-to-person |
| Combinations | 10⁶ (1M) | 10⁶ (1M) | 2³³ (8.5B) |
| Human-Readable | No (837492) | No (837492) | Yes (forest eagle mountain) |
Ready to protect what matters?
Join the waitlist for early access. Free for families. Enterprise pricing for businesses.