- New Phase 1 authentication system completed and deployed on new edge-based backend infrastructure
- Security Account identity handling redesigned — non-reversible identifiers now replace direct email storage in the application database
- Security Session lifecycle hardened — rotation, revocation, rate limiting, and lockout protections implemented
- Fix Aleph Vault fully migrated off Firebase Auth and integrated with the new authentication system
- Fix Session persistence verified across restart and state transitions
- Fix Production routing tightened and public endpoint exposure reduced
- Fix Privacy Policy and Terms of Service updated to reflect the current data model and infrastructure
- Fix General usability improvements shipped across vault interaction and input handling
- Fix Per-item password-to-open controls added as an opt-in access gate inside the encrypted vault
- Fix Item password handling upgraded to salted PBKDF2 verification with clearer user-facing language
- Soon Phase 2 begins — identity bootstrapping, anchor key alignment, and Cryptaverse identity layer
- New Updates & Changelog page added — tracks all changes across JC Laboratories products going forward
- New CipherPort branding established — community page renamed and repositioned as the gateway to Cryptaverse
- New Cryptaverse announced — privacy-first cryptographic safe harbor, coming soon
- New Cryptaverse product card added to homepage
- New Updates link added to site navigation and footer
- Fix Family tier now includes cloud backup — updated across all tier tables and legal pages
- Fix Privacy Policy and Terms of Service updated — CipherPort branding and tier language aligned
- Security Platform-level size limits enforced for CipherPort directory and dead drop inputs
- New Rebranded from JC Labs Community to CipherPort
- New Cryptaverse teaser added to page — gateway messaging and upcoming platform positioning
- Fix Copy key button fixed — now works correctly with all Aleph key formats
- Fix Clipboard fallback added for browsers that block navigator.clipboard
- Security Strict size and input constraints enforced across public-facing fields
- Soon Encrypted profiles — visible only to approved contacts
- Soon Dual-key identity model — separation of identity and encryption layers
- Soon Contact request system — access granted cryptographically on approval
- Soon Cryptographic groups — communities that exist only if you hold the key
- Soon Aleph Vault integration — device as secure key store for Cryptaverse
- Soon Profile and group content encrypted client-side before reaching servers — infrastructure stores ciphertext only