Skip to main content
Tucked
Cryptographic revocation

Revoke photo access, permanently

Shared something you regret? One tap and the encryption key is destroyed.

Why “delete shared photos remotely” is not enough

Most apps that claim to let you delete shared photos remotely are relying on the other person’s device to cooperate. Tucked takes a fundamentally different approach.

Typical apps

Remote delete request

The app sends a message to the other device asking it to delete the file. But the file was already decrypted and saved. If the other device ignores the request, or if the person copied the file before, the photo still exists, fully viewable.

  • Relies on the other device cooperating
  • File may already be saved in plaintext
  • No guarantee the file is actually gone
Tucked

Cryptographic revocation

The encryption key is destroyed on the server. Without it, the encrypted content cannot be decrypted. Without the key, there is no way to decrypt the content.

  • Server destroys the key, no cooperation needed
  • Decrypted content is never written to disk
  • Protects against future access after revocation

How revoking photo access works

Every photo you share gets its own unique encryption key. When you revoke access, that key is destroyed.

1

You share a photo

Tucked generates a unique Content Encryption Key (CEK) and encrypts the photo on your device before it ever leaves. The encrypted photo is uploaded, and the CEK is sealed to your partner's public key and stored on Tucked's server.

2

Your partner views it

When your partner opens the photo, their device requests the sealed CEK from the server, unseals it with their private key, and decrypts the content in memory. The decrypted photo is never written to disk. It exists only on screen.

3

You revoke access

One tap. The server deletes the sealed CEK and the content record, and pushes a deletion signal to your partner's device. Without the sealed key, the encrypted bytes cannot be decrypted.

What this means for you

You stay in control

Every photo and video you share through Tucked remains under your control. You decide who can see it, and you can change that decision at any time. One tap, and access is gone.

After a breakup

Revoke access to everything you ever shared, individually or all at once. The encryption keys are permanently destroyed, and your content becomes inaccessible through Tucked.

Your keys, your device

Your private encryption keys never leave your device. They are protected by Face ID and stored in secure hardware. Even we cannot see your content.

Nothing on disk

Decrypted content lives only in memory and is never written to disk. When you leave the app, cached content is purged. There are no plaintext files to find, anywhere.

Limitations

No app can guarantee perfect protection, and we will never pretend otherwise.

Revocation destroys the key needed to decrypt content. If the key has not been obtained by the time it is destroyed, the content is permanently inaccessible. That is a strong guarantee.

However, while content is being viewed, the decryption key exists briefly in device memory. A determined recipient could attempt to extract it during that window. Tucked minimizes this window: keys are held only momentarily, never written to disk, and content is purged when the app leaves the foreground.

What matters is what happens after that window closes. Once access is revoked and in-memory state is gone, the content cannot be recovered. Revocation is not a request. It is enforced by the architecture.

Common questions about revoking photo access

Join the waitlist

A private space for couples. Launching on iOS soon.