Skip to content
Back to Journals
Security Design December 15, 2025 2 min read

Plausible Deniability: Architecting Covert Decoys for Vulnerable Users

Standard privacy measures fail when the threat actor has physical access to the device. Here is how I use AI generation to build immersive decoy architectures.

In enterprise security, we talk about Zero Trust and end-to-end encryption. But for survivors of domestic abuse, the threat isn't a hacker intercepting a packet - it's an abuser standing behind them demanding to see their phone.

Existing 'covert' apps often disguise themselves as calculators or weather apps. Abusers know this. Furthermore, if a victim is frantically typing an evidence log into a 'weather app,' it immediately raises suspicion. You need a legitimate reason to be typing.

For Project Dana v2 (ChefAI), I evolved this into an entirely functional service. The Surface Layer is a polished recipe finder powered by TheMealDB API. The survivor has a valid, verifiable reason to be typing at length (inputting grocery lists, meal plans, or pantry inventories).

I also implemented Stealth Notifications. Standard push notifications are a vulnerability; an abuser might see an alert from a 'Safety App.' In v2, security alerts and safety plan reminders are hidden inside what appear to be standard informational updates.

Once inside the vault the architecture shifts. The AI engine doesn't just store data; it performs Legally-Aligned Translation, parsing raw emotional logs into sterile evidence indicators calibrated for Scottish Coercive Control laws.

True security in these environments is about active social camouflage. The application must not only encrypt the data but also provide the client with a legitimate, scrutinised 'Day in the Life' digital trail that masks their sanctuary.

Related Architecture

ChefAI / SafeHaven (Project Dana v2)

View Case Study

Living Infrastructure Note

Architect's Record: While this entry documents the initial implementation using the models available at the time of writing, this project remains a core component of my living infrastructure. All systems are systematically upgraded to the latest production-grade APIs (currently maintaining Gemini 2.0/3.0 parity) to ensure absolute performance, security, and technical sovereignty.


Are you facing an operational bottleneck?

I specialise in tearing down complex administrative debt and replacing it with frictionless, resilient workflows. Let's engineer your freedom.

Start the Conversation