Preventing Metadata Leaks
Written by Russo • Updated: July 2025
Locanox is designed to minimize metadata exposure at every layer of operation. Unlike traditional apps that quietly transmit device info, app version, or behavioral logs, Locanox applies multiple layers of protection to ensure that nothing about your session can be linked, fingerprinted, or logged, even when you go online.
In Private Online Mode, all network requests are routed through randomized relays. Your IP address is never exposed, and no unique device identifiers are sent. This prevents fingerprinting by websites, APIs, or third parties. Metadata such as file names, message lengths, timestamps, or app versions are stripped or obfuscated before any relay transmission.
Locanox also avoids traditional cloud sync or push notifications that typically carry metadata. All files remain encrypted locally unless explicitly uploaded via IPFS. Your AI memory and vault contents are stored in a sandboxed environment, and Locanox never auto-fetches or syncs anything in the background.
🔐 Key Protection Points:
✅ No IP address or device ID exposure
Your real IP address and device identifiers are never transmitted through relay networks.
🚫 No telemetry, push tracking, or background beacons
Complete elimination of background data transmission that could leak usage patterns.
🔄 Message sizes and timing are randomized in relay transmission
Communication patterns are obfuscated to prevent traffic analysis attacks.
📁 File uploads are stripped of names and encrypted before any network contact
All file metadata is removed and content is encrypted before transmission.
💾 Vault and AI data always remain local unless explicitly exported
Your sensitive data never leaves your device without explicit user action.
📉 No use of external analytics or behavior logging
Zero integration with tracking services or behavioral analysis systems.
How Metadata Protection Works
The multi-layered approach includes:
- Network Layer: All traffic routed through encrypted relays with IP masking
- Application Layer: No device fingerprinting or unique identifiers transmitted
- Data Layer: File names, timestamps, and sizes are stripped or randomized
- Session Layer: No persistent sessions that could be tracked across time
- Storage Layer: Local encryption prevents metadata extraction even if device is compromised
This comprehensive approach ensures that even sophisticated adversaries cannot build a profile of your activities or link your online actions to your identity.