Personal Security · Anti-Theft · Crypto-Shredding

Dinucci Zeroize

Your phone protects itself. When it detects theft, it destroys the master key in the security chip — making your data unrecoverable.

The Problem

Your phone carries your entire life

Photos, messages, passwords, banking apps. In case of theft, a 4-digit PIN is all that stands between the criminal and your data. Most smartphones offer no active protection — they passively wait for you to take action.

Zeroize monitors 7 risk signals in real time. When multiple signals point to a theft scenario, it acts on its own: it destroys the master cryptographic key stored in the security chip (TEE/StrongBox). Without the key, the data cannot be recovered — not even by forensic tools like Cellebrite.

No button to press. No remote command to send. The device protects itself, the instant it needs to.

9:41
85%
Z
Dinucci Zeroize
SECURITY DASHBOARD
NORMAL
Last check: 2s ago
Monitored Signals
Cellular
OK
GPS
OK
Wi-Fi
ALERT
SIM
OK
Internet
OK
Loc. Age
OK
Accuracy
OK
HOLD TO WIPE
Architecture

4 steps between normalcy and total protection

Zeroize does not depend on human action. Each step happens autonomously, with multiple verification layers to prevent false positives.

01

Detection

7 signals monitored every 2 seconds. Cellular network, GPS, Wi-Fi, SIM, real internet, location age, accuracy.

02

Verification

30-second debounce with 3 confirmations. Hysteresis: restored signal cancels suspicion. Anti-false-positive engine eliminates benign scenarios.

03

Authentication

Countdown timer. The owner has time to authenticate with PIN (PBKDF2-SHA256, 310k iterations) or Class 3 biometrics. Failure triggers next step.

04

Protection

Master key destroyed in TEE/StrongBox. 3 random passes + 1 zeros. Database, SharedPreferences, cache, clipboard — all overwritten.

Features

9 layers of anti-theft protection

Each feature was designed for a real-world threat scenario. No marketing gimmicks — verifiable cryptography, irreversible destruction, zero dependency on remote servers.

7 Monitored Signals

Cellular network, GPS, Wi-Fi, SIM, real internet connectivity, location age, accuracy. Checked every 2 seconds, 24 hours a day.

Anti-False-Positive Engine

30-second debounce with 3 consecutive confirmations. Hysteresis: a restored signal cancels the suspicion. The subway does not trigger a wipe.

Hardware Crypto-Shredding

AES-256-GCM keys stored in TEE/StrongBox. Instant, unrecoverable destruction — not even Cellebrite can extract data without the key.

Multi-Pass Overwrite

3 random passes + 1 zeros. Database, SharedPreferences, cache, clipboard. Nothing survives.

Duress PIN

A fake dashboard displayed to the attacker while the wipe executes in the background. Visually identical to the real app. Undetectable.

Strong Authentication

PBKDF2-SHA256 with 310,000 iterations. Class 3 biometrics. Constant-time comparison against timing attacks.

9-State Machine

Normal, Suspicion, Countdown, Authentication, Protection, Panic, and recovery states. Deterministic transitions, zero ambiguity.

Banking App Concealment

14 Brazilian banks pre-configured. Concealment and restoration reversible with authentication. The criminal does not know they exist.

Encrypted Audit

23 event types recorded. Logs encrypted with AES-256-GCM. Exportable for forensic analysis by the owner.