AuthPilot™ + AudioSync™ — Military‑Grade Identity & Security

A product by Audioscope. Distributed on Apple App Store (coming soon).

Important: AuthPilot™ handles 2FA codes from email, SMS (via iOS companion), and authenticator apps (TOTP, including Google Authenticator) through a secure bridge. The Mac app and iOS companion coordinate so the right code reaches the right device at the right moment — privately and under your control.
Publisher

Made by Audioscope

Audioscope is the company designing, publishing, and supporting AuthPilot™ and the AudioSync™ protocol. Contact: admin@audioscope.com.au. Website: audioscope.com.au. Trademark notice: AuthPilot™ and AudioSync™ are trademarks of Audioscope. Patent pending.

Why This

Stop proving you’re you — every five minutes

We’re all stuck in verification hell: OTPs, links, and forms for every login and purchase. With AI‑assisted fraud rising, “add more factors” (3FA, 4FA…) isn’t a future — it’s death by a thousand prompts. AuthPilot™ ends the busywork you already perform, locally and safely. AudioSync™ adds a proximity‑bound, offline factor using ultrasonic audio so you can prove “this exact phone is here, now” without Bluetooth or Wi‑Fi. Patent pending.

Security

Military‑grade crypto, local‑first storage, least‑privilege automation. Hardened runtime, code signing, notarized builds.

Time

No more hunting codes and links. AuthPilot™ watches Mail, copies OTPs, opens trusted verification links, and fills forms when you allow it.

Future

AudioSync™ unlocks offline device pairing, identity proofs, and encrypted file tokens — ideal for high‑security and air‑gapped environments.

System Overview

iPhone / iOS Companion • SMS 2FA bridge (consent‑gated) • TOTP vault (opt‑in import of otpauth://) • AudioSync™ Tx/Rx (ultrasonic) • Form hints (local learning) Mac / AuthPilot™ • Mail OTP/link automation (Apple Events) • Policy engine & Gus (background learner) • Keychain secrets, session keys, allow‑lists • Browser extension (form fill, Safari/Chrome) AudioSync™ encrypted channel X25519 → HKDF‑SHA‑256 → AEAD Frames: sync→header→encrypted payload→CRC/FEC Nonces/counters (replay‑proof), unlinkable sessions

All 2FA Sources, One Flow

A) Email OTP → Mac: Service emails code → AuthPilot™ reads Mail → copies OTP → optional ⌘V → verified.
B) SMS OTP → Mac: Service sends SMS → iOS Companion (consent‑gated) reads code → AudioSync™ to Mac → verified.
C) TOTP → Mac: iOS Companion holds TOTP secret (opt‑in import of otpauth://) → emits current TOTP via AudioSync™ → verified.
D) Login on iPhone: Companion fills locally (form + TOTP). If email OTP is involved, Mac AuthPilot™ may assist for device pairing.

AuthPilot™ Pipeline

Mail Ingestion

  • Apple Events (user‑granted Automation) to read recent Mail messages: sender, subject, received‑at, sanitized text body.
  • Dedupe by (message‑id, code, TTL); ignore stale messages; minimal scope.
  • Hardened runtime + code‑signed + notarized for distribution.

OTP & Link Engine

  • OTP detection via curated regex + heuristics; copies newest OTP to clipboard automatically.
  • Optional ⌘V auto‑paste (Accessibility; user‑toggled).
  • Verification links via URL detectors + keywords; per‑domain allow‑list; one‑time open; TTL windows.

Passwords & Keychain

  • CSPRNG generator with policy‑controlled length/charset.
  • Secrets in macOS Keychain (ThisDeviceOnly / when‑unlocked) — zero‑knowledge posture.
  • No cloud escrow by default; optional export with user consent.

Form Fill (Extension)

  • Safari/Chrome extension for email/password fields and in‑page OTP paste; local attestation to the macOS app.
  • No credentials leave your device; per‑site approvals; visibility for every action.

Gus — The Background Learner (Local‑Only)

Manual Configuration & Multi‑Account Intelligence

AudioSync™ Security (Public‑Safe)

Handshake • Ephemeral X25519 ECDH • HKDF‑SHA‑256 session key • Mutual authentication Frames • sync → header → encrypted payload • CRC/FEC + interleaving • Nonces & counters (replay‑proof) Privacy & Abuse Resistance • Unlinkable sessions (no persistent IDs) • Acoustic fingerprinting • Challenge‑response for sensitive ops

Public‑safe description. Proprietary modulation, pairing UX, and anti‑spoofing techniques are withheld. AudioSync™ patent pending. Publisher: Audioscope.

Web3 Identity Wallet & Document Vault

Architecture

  • Vault (local): Keys in Secure Enclave/Keychain; documents encrypted locally (AES‑GCM) with KEK derived via PBKDF2/HKDF.
  • Anchors (on‑chain): Only integrity hashes (no PII on‑chain). Optional off‑chain storage (IPFS/Arweave) with client‑side encryption.
  • DIDs/VCs: Hold verifiable credentials; present selective proofs (ZK‑friendly) for age, residency, licence, etc.
  • Payments & Cards: Tokenized card refs; PCI‑DSS‑aware flow by default. Local‑only storage is user‑choice and guarded by hardware keys.

User Sovereignty & Free Will

Users should own their identity and choose who sees what. By default, nothing leaves the device. When interaction is needed, you share proofs — not documents. This flips the power balance: privacy by default, transparency by consent.

  • One‑time identity setup; after that, present cryptographic proofs — not raw documents.
  • Forms auto‑populate from your vault with explicit approvals; services receive only what they need.
  • Recovery via social/multi‑sig guardians or hardware keys; fine‑grained revocation.

Threat Model

ThreatControlStatus
Mailbox scraping / token theftLocal‑only processing; minimal read scope; allow‑listsMVP
Audio replay / room injectionNonces, counters, challenge‑response, acoustic fingerprintingAudioSync v1
Phishing via verification linksPer‑domain allow‑lists; TTL; visible overridesMVP
Device compromise / theftKeychain + Secure Enclave; when‑unlocked ACL; optional passphrase gateMVP→
Metadata leakageNo persistent IDs; rotating keys; local logs onlyMVP→
Supply‑chain riskCode signing; hardened runtime; notarization; reproducible builds roadmapMVP→

Whitepaper (Inline)

1) Problem & Context. Credential stuffing, phishing, and identity theft are rising. High‑friction MFA wastes time and still leaks through human error. AuthPilot™ automates locally; AudioSync™ adds an offline, proximity‑bound factor that’s hard to phish or relay.

2) AuthPilot™ Pipeline. Mail ingest → OTP regex/heuristics → de‑dup/TTL → clipboard (+ optional auto‑paste) → verification link detection (allow‑list & one‑time open) → event log. Passwords via CSPRNG; stored in Keychain with ThisDeviceOnly constraints.

3) Learning & Connectors. Local models map services↔inboxes; user overrides allowed. Connectors: Apple Mail, Gmail API (OAuth, read‑only), Microsoft Graph (OAuth), IMAP/POP (app passwords). Tokens in Keychain; least‑privilege scopes.

4) AudioSync™ High‑Level Spec. Ephemeral ECDH, AEAD payloads, CRC/FEC; session rotation; unlinkability; challenge‑response; acoustic adaptation (AGC tolerance, multi‑path, timebase compensation). Tokens/proofs/small blobs; larger files chunked with per‑chunk MACs.

5) Identity Wallet & Web3. DIDs/VCs; client‑encrypted docs; on‑chain integrity anchors; selective disclosure; social/multi‑sig recovery and hardware key support planned.

6) Limits. No system defeats exposed keys. UX emphasizes safe approvals, visible state, and recovery pathways.

Secret Key & Hash Demo

Click to generate a random 256‑bit secret key (client‑side). Then type any text to see how a single character completely changes its SHA‑256 hash.

Generate Secret Key

Secret (hex):

Secret (Base64):

Hash any message:

Developer Invitation

Developers, researchers, and partners interested in the protocol, browser extensions, or embedded device SDKs — we’d love to hear from you.

Contact Audioscope