Post-Quantum Encrypted File Relay
Sensitive files in transit are your biggest audit risk.
Email attachments linger in inboxes, cloud shares remain accessible long after a deal closes, and legacy transfer tools have no post-quantum protection. One breach exposes patient records, legal strategy, or industrial controls — and triggers mandatory reporting under NIS2, DORA, and NEN 7510.| Key exchange | ML-KEM-768 + ECDH P-256 hybrid (FIPS 203 draft) |
| Symmetric cipher | AES-256-GCM with per-file random IV |
| Integrity | Merkle CT log, SHA-256 leaf hashes |
| Relay identity | ML-DSA-65 self-signed certificate |
| Transport | TLS 1.3, optional WebSocket streaming |
| File size | Up to 5 MB (padded to hide true size) |
| Infrastructure | Hetzner Falkenstein DE, no US sub-processors |
| License | BUSL-1.1 CE (≤5 users free), Pro key for unlimited |
plk_)