Trust stack

Private by default, explained in parent language first.

Tubestr uses modern identity and encryption protocols, but the point is not the buzzwords. The point is that kids share only with approved people and family videos are not turned into ad-targeting data.

What the technology is supposed to do for your family

Keep identity in the family’s hands

Your family controls the keys and access model instead of depending on a platform-owned follower graph.

Keep sharing private by default

Tubestr is built so family videos move inside trusted groups rather than toward a public audience.

Keep incentives aligned with trust

No ad or algorithm business model means less pressure to maximize attention at the expense of safety.

The underlying systems

Protocols second, parent outcomes first.

Nostr

An open identity and relay protocol that helps Tubestr avoid building family identity around a single corporate silo.

Parent meaning

For parents: your family’s access model is not tied to an ad-network account.

Tubestr uses Nostr primitives so identity and routing can stay portable and family-owned.

MLS

A modern group-encryption protocol used to secure communication inside trusted circles.

Parent meaning

For parents: approved group sharing can stay encrypted while still feeling fast in the app.

MLS gives Tubestr a standard way to manage changing family groups without dropping privacy.

Marmot

Tubestr’s implementation work that makes encrypted family sharing practical for the actual product experience.

Parent meaning

For parents: the privacy layer is meant to work in the background instead of becoming homework.

This is where protocol choices are turned into the sending, receiving, and syncing experience families actually touch.

End-to-end encryption is the rule, not the upgrade path

Videos are protected so the intended family group can access them. That reduces exposure to platform operators, network intermediaries, and the usual ad-tech profile building that comes with mainstream social products.

Private groups are meant to stay private even as families add or remove approved members.

Security work happens under the product instead of asking parents or kids to manage crypto concepts manually.

The architecture is designed around trusted distribution, not public virality.

Read the positioning, then install the beta.

If the product promise fits your family, the download page has the current install paths and beta expectations.