Cryptaverse / Aleph Vault Phase 1
  • New Phase 1 authentication system completed and deployed on new edge-based backend infrastructure
  • Security Account identity handling redesigned — non-reversible identifiers now replace direct email storage in the application database
  • Security Session lifecycle hardened — rotation, revocation, rate limiting, and lockout protections implemented
  • Fix Aleph Vault fully migrated off Firebase Auth and integrated with the new authentication system
  • Fix Session persistence verified across restart and state transitions
  • Fix Production routing tightened and public endpoint exposure reduced
  • Fix Privacy Policy and Terms of Service updated to reflect the current data model and infrastructure
  • Fix General usability improvements shipped across vault interaction and input handling
  • Fix Per-item password-to-open controls added as an opt-in access gate inside the encrypted vault
  • Fix Item password handling upgraded to salted PBKDF2 verification with clearer user-facing language
  • Soon Phase 2 begins — identity bootstrapping, anchor key alignment, and Cryptaverse identity layer
jclabs.tech Update
  • New Updates & Changelog page added — tracks all changes across JC Laboratories products going forward
  • New CipherPort branding established — community page renamed and repositioned as the gateway to Cryptaverse
  • New Cryptaverse announced — privacy-first cryptographic safe harbor, coming soon
  • New Cryptaverse product card added to homepage
  • New Updates link added to site navigation and footer
  • Fix Family tier now includes cloud backup — updated across all tier tables and legal pages
  • Fix Privacy Policy and Terms of Service updated — CipherPort branding and tier language aligned
  • Security Platform-level size limits enforced for CipherPort directory and dead drop inputs
CipherPort Update
  • New Rebranded from JC Labs Community to CipherPort
  • New Cryptaverse teaser added to page — gateway messaging and upcoming platform positioning
  • Fix Copy key button fixed — now works correctly with all Aleph key formats
  • Fix Clipboard fallback added for browsers that block navigator.clipboard
  • Security Strict size and input constraints enforced across public-facing fields
Cryptaverse Announced
  • Soon Encrypted profiles — visible only to approved contacts
  • Soon Dual-key identity model — separation of identity and encryption layers
  • Soon Contact request system — access granted cryptographically on approval
  • Soon Cryptographic groups — communities that exist only if you hold the key
  • Soon Aleph Vault integration — device as secure key store for Cryptaverse
  • Soon Profile and group content encrypted client-side before reaching servers — infrastructure stores ciphertext only