<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Arcov Blog</title>
    <link>https://arcov.app/blog</link>
    <description>Writing on couples, privacy, and small daily rituals — from the team building Arcov.</description>
    <language>en-us</language>
    <atom:link href="https://arcov.app/blog/feed.xml" rel="self" type="application/rss+xml" />
    <lastBuildDate>Wed, 06 May 2026 01:28:24 GMT</lastBuildDate>
    <item>
      <title>Where does your relationship data live?</title>
      <link>https://arcov.app/blog/where-does-your-relationship-data-live</link>
      <guid isPermaLink="true">https://arcov.app/blog/where-does-your-relationship-data-live</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate>
      <category>privacy</category>
      <category>couples-apps</category>
      <description><![CDATA[<p>Here&#39;s a question almost no one asks before downloading a couples app: when you write something inside it — a note to your partner, a memory, a daily mood — where does that data actually go?</p>
<p>We were curious, so we read the privacy policies of every couples app we could find. Most of them follow one of three patterns. None of them describe it this clearly.</p>
<h2>Pattern 1: Stored in the clear, monetized</h2>
<p>The free apps. Your messages, photos, and entries land on their server in plaintext. The company can read them. Their employees with admin access can read them. Their analytics tools can read them. If a third party buys the company, the new owner can read them.</p>
<p>How do they make money? Some sell ads against your activity. Some sell anonymized &quot;engagement signals&quot; to data brokers. Some are loss leaders for upsells. The exact model varies, but if you&#39;re not paying, your data is paying instead.</p>
<p>The privacy policies are usually 4,000 words long and bury this in section 7.</p>
<h2>Pattern 2: Encrypted-at-rest, but they have the key</h2>
<p>A step better. The data on the server is encrypted, so a casual breach exposes ciphertext instead of plaintext.</p>
<p>But the encryption key sits on the same server, or at least on infrastructure the company controls. Internally, they can decrypt anything they want — the encryption is mostly for &quot;data at rest&quot; compliance, not for keeping the company itself out.</p>
<p>This is the most common setup for paid apps that <em>don&#39;t</em> advertise end-to-end encryption. It protects against a thief stealing a hard drive. It does not protect against a subpoena, a curious engineer, or a future change in the company&#39;s business model.</p>
<h2>Pattern 3: End-to-end encrypted, keys on your devices</h2>
<p>The rare model. The encryption key is generated on your phone when you sign up and never leaves it. Anything you save is encrypted before it&#39;s sent. The server stores ciphertext. The company genuinely cannot read what&#39;s there.</p>
<p>The cost: if you lose your phone and don&#39;t have a backup of your key, your data is gone. The company can&#39;t recover it because they don&#39;t have the key. Some apps mitigate this with social recovery (your partner can re-grant access) or recovery phrases stored offline.</p>
<p>This is the pattern we picked for <a href="/">Arcov</a>, and we <a href="/blog/end-to-end-encryption-for-couples">wrote about why</a> in more detail.</p>
<h2>What to actually ask before you trust an app</h2>
<p>If you&#39;re reading a couples app&#39;s privacy policy and want to figure out which pattern they use, three questions cut through the marketing:</p>
<ol>
<li><strong>&quot;Can your employees read my messages and photos if they wanted to?&quot;</strong> A clear &quot;no&quot; with technical detail (e.g., &quot;the keys are on your device&quot;) = pattern 3. Anything hedged, vague, or about &quot;policies and access controls&quot; = pattern 1 or 2.</li>
<li><strong>&quot;What happens if a court orders you to hand over my account contents?&quot;</strong> If they say &quot;we&#39;d comply with the order and provide what we have,&quot; they have the data. If they say &quot;we don&#39;t have the keys, so we can&#39;t decrypt — we&#39;d hand over ciphertext,&quot; that&#39;s pattern 3.</li>
<li><strong>&quot;How are you funded?&quot;</strong> If the answer is ads or &quot;data partnerships,&quot; the business model is at odds with your privacy. If it&#39;s a small subscription fee, the incentives line up.</li>
</ol>
<p>Most apps will dance around these. The ones that answer plainly are the ones worth trusting.</p>
<h2>Why this matters for couples specifically</h2>
<p>For most apps, &quot;your data&quot; is browsing history or step counts. For a couples app, your data is the most intimate stuff you&#39;ve ever written down — moods, fears, photos you wouldn&#39;t share with anyone else, the specific texture of your relationship.</p>
<p>That deserves a different bar.</p>
<p>If you&#39;re choosing a couples app, ask the three questions above before you put six months of your life inside it. And if your current app&#39;s privacy policy is vague on any of them, that&#39;s worth knowing.</p>
]]></description>
    </item>
    <item>
      <title>What end-to-end encryption actually means for couples</title>
      <link>https://arcov.app/blog/end-to-end-encryption-for-couples</link>
      <guid isPermaLink="true">https://arcov.app/blog/end-to-end-encryption-for-couples</guid>
      <pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate>
      <category>privacy</category>
      <category>encryption</category>
      <category>engineering</category>
      <description><![CDATA[<p>Most apps say they&#39;re &quot;secure&quot; or &quot;encrypted.&quot; Almost none of them tell you what that actually means in plain English. So here&#39;s what end-to-end encryption means in Arcov — exactly what&#39;s encrypted, exactly what isn&#39;t, why we drew the line where we did, and what happens if you lose your phone.</p>
<p>We are going to be specific, because vague claims are how privacy-washing works.</p>
<h2>What end-to-end encryption actually means</h2>
<p>When you and your partner pair, your two phones generate a shared 256-bit encryption key. Each side derives one half of it on-device, and the key never gets sent to our servers — not on signup, not on backup, not ever.</p>
<p>So when you write something to your partner in Arcov, your phone wraps it in that key before it leaves your device. What travels from your phone to ours is a sealed envelope of ciphertext. We forward it to your partner&#39;s device, where their phone uses the matching key to unseal it. The whole time it sits on our servers, in our database, in our backups, it&#39;s gibberish that we can&#39;t read.</p>
<p>That&#39;s &quot;end-to-end&quot;: encrypted at one end (your phone), decrypted at the other end (your partner&#39;s phone), and unreadable everywhere in between, including by us. Under the hood we use <strong>XChaCha20-Poly1305</strong>, the same family of authenticated encryption used by Cloudflare, WireGuard, and 1Password.</p>
<h2>Exactly what we cannot see</h2>
<p>This is the honest list. These fields are encrypted on your device before upload, with a key only your two phones hold:</p>
<ul>
<li><strong>Memory Vault photos.</strong></li>
<li><strong>Memory Vault voice notes.</strong></li>
<li><strong>Memory Vault captions</strong> (the line you write under a photo).</li>
<li><strong>Photo thumbnails</strong> (we generate these on your device too, then encrypt them as a separate file).</li>
<li><strong>The free-text note</strong> you optionally attach to a mood check-in.</li>
<li><strong>Daily highlights</strong> — the one-line &quot;best part of today&quot; you share with your partner.</li>
<li><strong>Your answers to the shared daily question.</strong></li>
</ul>
<p>If a court ordered us to hand over the contents of any of those fields, we couldn&#39;t. The keys aren&#39;t ours to hand over. That&#39;s not a marketing promise — it&#39;s a property of the math.</p>
<h2>Exactly what we <em>can</em> see (and why)</h2>
<p>We&#39;re not going to pretend Arcov is invisible. Some things have to be readable on the server for the app to work at all. Here&#39;s the full list:</p>
<ul>
<li><strong>Your email, display name, avatar, timezone, check-in time, push-notification token, and notification preferences.</strong> These power your account, partner-side rendering, scheduled reminders, and routing pushes to your phone.</li>
<li><strong>Your IP address when you connect</strong>, like every other server you talk to.</li>
<li><strong>The mood number you pick (1, 2, 3, 4, or 5).</strong> The optional note that goes with it is encrypted; the number itself is plaintext on purpose. If we encrypted the number, the partner-mood home-screen widget couldn&#39;t show your partner anything when they glance at their phone, the mood-match notification couldn&#39;t fire when you both check in, and weekly trend insights (&quot;you both tend to feel great on Saturdays&quot;) would have to vanish too. We made a deliberate trade: numbers stay readable, words stay private.</li>
<li><strong>Metadata about activity</strong>, but not its contents. We can see <em>that</em> you wrote a highlight today, <em>that</em> you saved a memory, <em>that</em> you sent a buzz to your partner — but not what any of it says. A buzz has no content of its own — it&#39;s just a haptic ping — so &quot;I sent a buzz at 3:14pm&quot; is the entire story. The fact that a highlight or note exists is what powers the couple streak and the &quot;shared a highlight every day this week&quot; insight; we never read the words.</li>
<li><strong>Reactions and presence taps.</strong> The 🔥 emoji you tapped on your partner&#39;s memory and the &quot;Good morning ☀️ / Good night 🌙&quot; presence taps are plaintext — they&#39;re a single emoji or a single enum value, with no free text to encrypt.</li>
<li><strong>Aggregated usage stats</strong>, like &quot;how many total users this week&quot; — never tied to specific accounts, never sold.</li>
</ul>
<p>That last one matters. We run on revenue from a small subscription fee — not from selling data. The whole reason we built Arcov as a paid app for two people is so we don&#39;t have to monetize what you say to each other.</p>
<h2>Why on-device keys matter</h2>
<p><img src="/blog/phone-warm-light.jpg" alt="A phone wrapped in warm string lights, held in a hand"></p>
<p>You&#39;ll see a lot of apps claim they &quot;encrypt your data.&quot; Most of them mean: <em>they</em> encrypt the data, and <em>they</em> hold the keys.</p>
<p>That kind of encryption protects you against someone breaking into the office and stealing the hard drives. It does <em>not</em> protect you against:</p>
<ul>
<li>A government request that the company decrypt your data and hand it over.</li>
<li>A rogue employee with admin access.</li>
<li>A breach where attackers get the keys along with the data.</li>
<li>The company itself, if it ever decided to scan your messages to train an AI model, build a recommendation engine, or &quot;improve the experience.&quot;</li>
</ul>
<p>End-to-end encryption with on-device keys protects you against all of those, because the keys aren&#39;t on our servers in the first place.</p>
<h2>What happens if you lose your phone</h2>
<p>This is the part most &quot;we encrypt everything&quot; pitches skip past. When <em>you</em> hold the keys, <em>you</em> are responsible for them. We tried to soften that without breaking the math, so Arcov has two recovery paths:</p>
<p><strong>Primary — your partner restores you.</strong> When you and your partner first set up encryption, your master seed is split into three pieces using Shamir&#39;s Secret Sharing. One piece lives on your phone, one on our server, and one is sealed to your partner&#39;s public key. <em>Any two of the three</em> can reconstruct your seed; no single party — including us — can do it alone.</p>
<p>So if you lose your phone, you sign in on a new one, tap &quot;I lost my phone,&quot; and your partner gets a notification. They tap &quot;approve&quot; in their app, our server combines the partner-held share with the server-held share, and your encrypted content comes back within seconds. The math is what guarantees this is safe: even though our server holds one share, we can&#39;t recover anything without your partner&#39;s device also approving.</p>
<p><strong>Fallback — a 12-word recovery phrase.</strong> For the rare case where both of you lose your phones at the same time, you can view a 12-word phrase (BIP39 standard) in Settings → Privacy &amp; Security and write it down. With that phrase, you can restore on a new device without your partner&#39;s help. Without it <em>and</em> without your partner&#39;s device, your encrypted content really is gone — and yes, that&#39;s an inherent property of end-to-end encryption, not a flaw in Arcov. The whole point is that we don&#39;t have a master key to reset yours with.</p>
<p>Some apps handle this by keeping a backup key on their server. That&#39;s exactly what makes their &quot;encryption&quot; something they can decrypt. We don&#39;t.</p>
<h2>Why we built it this way</h2>
<p>Most apps for couples treat &quot;your relationship data&quot; as the product. The free ones sell it to advertisers. The paid ones store it on servers they could be compelled to turn over. Either way, the most intimate things you write to your partner are sitting on someone else&#39;s computer, readable.</p>
<p>That bothered us. So we built Arcov as the version we&#39;d want to use ourselves — encrypted in a way where, if you don&#39;t trust us, you don&#39;t have to. The math protects you either way.</p>
<p>If that matters to you too, <a href="/#beta">the beta is open</a>. Free for the first 50 couples to pair up, 12 months free for the next 200. iOS and Android.</p>
]]></description>
    </item>
    <item>
      <title>Hello</title>
      <link>https://arcov.app/blog/hello</link>
      <guid isPermaLink="true">https://arcov.app/blog/hello</guid>
      <pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate>
      <category>meta</category>
      <description><![CDATA[<p>Welcome to the Arcov blog.</p>
<p>A short note on what this is for. I&#39;ll write about two things here:</p>
<ul>
<li><strong>Privacy</strong> — why Arcov is end-to-end encrypted, where your keys live (on your device, not our servers), and why we don&#39;t sell data even though that&#39;s how most apps in our category make money.</li>
<li><strong>Couples and small rituals</strong> — what we&#39;re learning from people using the beta, what the research actually says about daily check-ins, and what we&#39;re trying ourselves.</li>
</ul>
<p>No AI-generated filler. Just things worth writing down.</p>
<p>If you want to try the app, the <a href="/#beta">beta is open</a>.</p>
]]></description>
    </item>
  </channel>
</rss>
