Security

The security architecture behind Avalw Shield

12 min readApril 2026By Avalw Team

Most privacy apps ask you to trust them. We built Shield so you do not have to. Zero servers. Zero data retention. Zero network connections. Here is exactly how the architecture works and how you can verify every claim yourself.

The fundamental design principle: zero trust required

When you install a privacy or security application, you are placing an enormous amount of trust in its developers. You are giving an app access to your camera, your screen, and potentially your most sensitive work. Most apps take that trust and route your data through cloud servers for processing.

We took a different approach. We designed Shield so that trust is not required at all. Every architectural decision was made to ensure that even if we wanted to misuse your data, we could not. The system makes it structurally impossible.

The most secure system is not the one with the best encryption. It is the one where sensitive data never exists in a transmittable form in the first place.

Zero server architecture

Avalw Shield has no server. Not a secure server. Not an encrypted server. No server at all.

There is no API endpoint, no cloud backend, no analytics service, no telemetry collection, no update phone-home, no crash reporting server. The application is entirely self-contained on your device.

What this means in practice

How to verify: network monitoring

Install Little Snitch or Lulu (both free/open-source firewall apps for Mac). These tools show every outgoing network connection from every application. Launch Shield and use it normally. You will see zero connection attempts. Not one. Compare this with other apps on your system and you will likely be surprised by how many "offline" apps phone home constantly.

Zero data retention

This is the most important architectural decision in Shield and the one that separates it from virtually every other camera-based application.

When Shield captures a frame from your camera, it processes that frame entirely in memory. The frame is analyzed by the on-device machine learning model, which produces exactly one output: an integer representing the number of faces detected, along with basic geometric data about their positions.

That is it. The raw camera frame is immediately discarded from memory. It is never written to disk. It is never saved as a file. It is never cached. It is never transmitted.

The data lifecycle of a single frame

At no point in this process does a recognizable image of your face exist outside of volatile RAM. There is no image file anywhere on your disk. There is no thumbnail. There is no log with timestamps and face data. There is nothing to steal, nothing to subpoena, nothing to leak.

We do not store your face. We do not store an image of your face. We do not store an encoding of your face. We store an integer. That is the entire privacy model.

Memory cleanup after each frame

After each frame is processed, Shield performs explicit memory cleanup. The pixel buffer that held the camera frame is overwritten with zeros before being deallocated. This prevents even theoretical recovery of image data from memory dumps.

This is not standard practice. Most applications simply release memory and let the operating system reclaim it at its leisure, leaving data potentially readable in freed memory pages. Shield actively zeros the data before release, which is the same approach used by cryptographic libraries handling encryption keys.

Hardware camera LED

On every modern Mac, the camera LED is hardwired to the camera's power circuit. This is not a software feature. It is a physical electrical connection on the circuit board. When the camera receives power, the LED turns on. It is impossible to activate the camera without the LED illuminating.

This means you always know when Shield is using the camera. When the green LED is on, Shield is actively processing frames. When you close Shield, the LED turns off immediately. There is no way for Shield or any other application to secretly access the camera.

How to verify: camera access

Open System Settings, then Privacy & Security, then Camera. You will see a list of every application that has been granted camera access. Shield will be listed here. You can revoke access at any time, and Shield will simply not function until you re-grant it. The operating system enforces this at the kernel level.

Screen capture protection

When Shield blurs your screen in response to a Shoulder Guard alert, the blur overlay is rendered using a special window type that is excluded from screen capture APIs. This means that if someone attempts to take a screenshot, use a screen recording tool, or share their screen while Shield is active, the blur overlay will appear in the capture.

This is an important detail. Without this protection, an attacker could theoretically trigger Shoulder Guard and then use a screen recording tool to capture the content behind the blur. Shield prevents this by ensuring the blur is present in all capture methods provided by the operating system.

What we do not do (but others do)

To understand why Shield's architecture matters, it helps to look at what other privacy and security apps commonly do:

Common industry practices

What other apps do with your camera data

Many "privacy" apps upload camera frames to cloud servers for processing. Some store face embeddings (mathematical representations of your face) in remote databases. Others send analytics data including timestamps, usage patterns, and device information. Some use third-party SDKs that collect data independently of the app developer's stated policy.

Shield does none of these things. Here is a direct comparison:

Code signing and App Store review

Shield is code-signed with an Apple Developer certificate, which provides several guarantees:

This means you can be confident that the app running on your machine is the exact same binary that was reviewed and signed. No one has tampered with it in transit.

How to verify: code signature

Open Terminal and run: codesign -dv --verbose=4 /Applications/Avalw\ Shield.app. This will display the full code signature details including the developer identity, team ID, and signing certificate chain. You can verify this matches the official Avalw SRL developer identity.

Integrity hash verification

For users who want the highest level of assurance, you can verify the integrity of the Shield binary by computing its hash and comparing it against the published hash on our website.

We publish SHA-256 hashes for every release. You can compute the hash of your installed binary using Terminal:

shasum -a 256 /Applications/Avalw\ Shield.app/Contents/MacOS/Avalw\ Shield

If the hash matches the one published on our website, you have cryptographic proof that your binary is identical to the one we built and signed. Any modification, no matter how small, would produce a completely different hash.

How to verify everything yourself

We believe that trust should be verified, not assumed. Here is a complete checklist for verifying every privacy claim we make:

Why this matters

Privacy is not a feature you can bolt on after the fact. It is an architectural decision that must be made at the foundation. Once you build a system that sends data to a server, you have created a permanent attack surface. A server can be hacked, subpoenaed, misconfigured, or sold to a new owner with different values.

By building Shield with no server, no data retention, and no network connections, we eliminated these attack surfaces entirely. There is nothing to hack because there is no server. There is nothing to leak because there is no data. There is nothing to subpoena because there is no record.

The strongest privacy guarantee is not a promise. It is an architecture that makes violation impossible.

That is the security architecture behind Avalw Shield. Not a policy. Not a promise. A structural impossibility.

Try Avalw Shield