This project is a static research artifact. DO NOT USE IN PRODUCTION. It is provided for educational and analytical purposes only. It has not undergone a formal security audit. It implements experimental cryptographic primitives and hardware bindings that may contain vulnerabilities.
DO NOT use this software to protect sensitive data, passwords, or critical infrastructure.
This project is ARCHIVED and UNMAINTAINED.
The author has ceased development. No further updates, bug fixes, or security patches will be released.
| Version | Supported |
|---|---|
| 1.0.x | ❌ No |
| < 1.0 | ❌ No |
Because this project is archived and no longer maintained, we are not accepting vulnerability reports for the purpose of issuing patches.
If you discover a security flaw, you are welcome to publish your findings for educational purposes, as no fix will be provided by the repository owner.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES, OR OTHER LIABILITY ARISING FROM THE USE OF THIS SOFTWARE.