just $20 CAD (yeah, that's in Chuck's Bucks) On Patreon.
SEPC eliminates ciphertext transmission entirely by replacing encrypted messages with coordinate references into shared, ephemeral entropy pools. Instead of sending encrypted data, communicating parties exchange positional mappings that reference characters within time-limited, high-entropy data structures.
 1. Entropy Pool Generation: 15KB high-entropy byte pools
2. Coordinate Mapping: Message bytes mapped to pool positions using cryptographically secure selection
3. Index Encoding: Position references encoded using XOR obfuscation
4. Distributed Storage: Encrypted pools stored across decentralized vault network with TTL-based auto-destruction
5. Key Exchange: X25519 ECDH for secure parameter transmission
 - Forensic Resistance: No recoverable ciphertext exists on network or storage
- Perfect Forward Secrecy: Single-use pools with automatic destruction
- Plausible Deniability: Coordinate mappings indistinguishable from random data
- Quantum Readiness: Compatible with post-quantum cryptographic primitives
- Traffic Analysis Resistance: Variable message lengths map to consistent pool sizes
 - No ciphertext to store for future quantum attacks
- No provable connection between communicating parties and content
- Distributed infrastructure eliminates single points of failure
- Vault operators have zero knowledge of stored content (AES-SIV encrypted blobs only)
 - Pool access requires exact SHA-256 hash (2^256 search space)
- 10-minute TTL limits attack window
- ~1 billion total pools vs. 2^256 possible hashes ≈ 10^-68 success probability
 - FastAPI-based distributed vault system
- FUSE filesystem with secure file shredding
- X25519 ECDH key exchange with AES-GCM protection
- Chunked file transfer supporting arbitrary file sizes
- SHA-256 integrity verification
- Entropy validation and media detection
 - Deniable Communications: Executive/diplomatic messaging with built-in deniability
- Quantum-Secure Channels: Communications resistant to both classical and quantum attacks
- Forensically Resistant Systems: Medical, legal, or corporate data requiring evidence elimination
- Censorship Resistance: Distributed infrastructure immune to single-point shutdowns
This site is running a SEPC Vault on port 8080.(https://www.hekateforge.com:8080/pool)
Binaries for SEPC File Tool are provided below for Windows (.exe) or Linux (bin)
This tool is command-line only. Usage examples below.
 Receive Files:
sepc -l [C:\Users\MyUsername\Desktop] -p https://www.hekateforge.com:8080/pool
 Send Files:
sepc -s [RecipientIPADDR] -f [C:\Users\MyUsername\Documents\MyFile.docx] -p https://www.hekateforge.com:8080/pool
 OR just run it and it will ask...