🎉 Early Access Discount — Use code EARLYACCESS at checkout View Pricing →
📖 Learn

Security & Privacy Glossary

Clear, jargon-free definitions of the encryption, anti-malware, and privacy concepts behind PhantomSecure — and behind a genuinely private Mac.

17 terms

AES-256-GCM

Encryption

A widely trusted symmetric encryption standard. Its "GCM" mode also verifies that data hasn't been tampered with. PhantomVault pairs AES-256-GCM with post-quantum encryption for layered protection.

Used in PhantomVault →

Apple Silicon

Platform

Apple's own line of Mac processors — the M-series chips. PhantomSecure is built exclusively for Apple Silicon so it can use the hardware's security features and run AI models entirely on-device.

Argon2id

Encryption

A modern key derivation function that turns your password into an encryption key while strongly resisting cracking attempts. PhantomVault uses it to harden vault passwords.

Used in PhantomVault →

Deep packet inspection

Network

Examining the full contents of network traffic, not just its headers, to detect threats. PhantomProtect performs deep packet inspection on-device to catch malware and phishing in real time.

Used in PhantomProtect →

DNS filtering

Network

Blocking harmful or unwanted sites at the domain-name level, before a connection is ever made. PhantomProtect filters DNS locally on your Mac, with no cloud lookups.

Used in PhantomProtect →

DoD 5220.22-M

Secure deletion

A U.S. Department of Defense data-sanitization standard that overwrites storage multiple times so deleted data cannot be recovered. It is one of the erasure methods PhantomWipe offers.

Used in PhantomWipe →

Gutmann method

Secure deletion

A secure-deletion technique that overwrites data up to 35 times to defeat even advanced forensic recovery. PhantomWipe offers Gutmann as its most thorough erasure option.

Used in PhantomWipe →

Hidden volume

Encryption

An encrypted container concealed inside another, so an outer "decoy" vault can be opened without revealing the inner one. Hidden volumes are the foundation of plausible deniability.

Used in PhantomVault →

Network Extension

Network

An Apple framework that lets security software inspect or filter network traffic across the whole system. PhantomWatch and PhantomProtect are both built on it.

Used in PhantomWatch →

On-device processing

Privacy

Performing analysis and encryption locally on your Mac instead of sending data to a remote server. It is the core of PhantomSecure's privacy-first design — your data never leaves your device.

Plausible deniability

Encryption

A security property that lets you credibly deny that hidden encrypted data exists at all. PhantomVault's decoy volumes reveal harmless files under one password while real data stays invisible under another.

Used in PhantomVault →

Post-quantum encryption

Encryption

Encryption designed to resist attacks from future quantum computers. PhantomVault uses the Kyber-768 algorithm so your data stays protected even against quantum decryption attempts years from now.

Used in PhantomVault →

Secure deletion

Secure deletion

Permanently destroying data by overwriting the actual storage — not just removing the file's reference, which is all the Trash does. PhantomWipe handles secure deletion down to the raw sectors.

Used in PhantomWipe →

Telemetry

Privacy

Usage and diagnostic data that software quietly collects and sends back to its maker. PhantomSecure collects none — there is no telemetry pipeline in the product at all.

TRIM

Secure deletion

A command that tells an SSD which blocks are no longer in use so it can physically clear them. PhantomWipe issues TRIM to help ensure deleted data is truly gone from flash storage.

Used in PhantomWipe →

YARA-X

Network

A modern engine for writing rules that identify malware by its characteristics rather than a simple signature. PhantomProtect integrates YARA-X to scan for threats entirely on-device.

Used in PhantomProtect →

Zero-knowledge encryption

Privacy

A design where only you hold the keys to your data — not even the software maker can read it. PhantomSecure generates and stores encryption keys only on your device.

No terms match your search. Try a different word.

See these ideas in action

Every term above is something PhantomSecure actually does. Explore the suite and put privacy-first security to work on your Mac.

Explore the Features Join Early Access