HearRelay

Sound Monitor for Baby & Noise Check

View My GitHub Profile

Security

Thank you for helping us keep HearRelay users safe. This page explains how to report vulnerabilities and summarises HearRelay’s security posture.


Reporting a vulnerability

Please email hearrelay-security@conex-cp.com with the following information:

We prefer email for the initial report. If needed, we can set up a GitHub Security Advisory (Private Disclosure) for ongoing coordination.

Please do not publish details of a vulnerability before we have had a chance to respond and ship a fix.


What we consider in-scope

The following are in-scope for reporting:


Out of scope


Response targets

Severity First response Target resolution
Critical within 24 hours within 7 days
High within 3 days within 30 days
Medium / Low within 7 days next regular release

These are targets, not guarantees.


Coordinated disclosure


Security posture summary

HearRelay is designed around three principles:

  1. Data minimisation — no audio or recordings leave your device; no analytics or advertising SDKs.
  2. Local network only — paired devices communicate exclusively over the same Wi-Fi / local network, never over the internet.
  3. Cryptographic peer identity — devices identify each other with Curve25519 / P-256 keys, protected in the Secure Enclave where supported, and discovered via iCloud Key-Value Storage scoped to your Apple ID.

Transport is encrypted with TLS 1.3 using only the AEAD cipher suites provided by iOS.

For a fuller internal write-up, see the project design docs.


Contact


日本語版: セキュリティ