A policy-aware encrypted envelope workflow platform built on standard authenticated encryption. Package structured messages into session artifacts, compare routing policies, export signed bundles, and verify trust — with semantics that distinguish integrity from authenticity.
Evaluate trust semantics, signed verification workflows, and the hardening posture of a system that documents its own boundaries.
Run the full demo: build envelopes, compare policies, export bundles, verify signatures. 189 tests. Copy-paste review commands. 15-minute evaluation path.
Understand how policy-aware encrypted workflows, persisted security artifacts, and signed bundle verification integrate into existing infrastructure.
Canonical symbolic preprocessing normalizes input into deterministic token streams via the Bry layer.
ChaCha20-Poly1305 authenticated encryption seals messages into validated packets, grouped into multi-message session envelopes.
Run the same messages under different routing policies. See exactly what changes, what doesn't, and why.
Export signed bundles with SHA-256 manifests and HMAC signatures. Verify with unambiguous trust semantics.
Hands-on evaluation of the protocol, trust model, and verification semantics.
Assess the trust model, hardening status, and documented boundaries.
Understand the product, see it in operation, and assess fit.
Run the same messages under manual, default, and auto routing. See which messages trigger specialist overrides and why. Differences are explicit and per-message.
Envelopes, policy comparisons, and artifact comparisons are saved with SHA-256 integrity binding. Tampered files are rejected on load.
Export bundles with HMAC-SHA256 signatures over SHA-256 manifests. Verification output is unambiguous: integrity, signature, metadata, trust.
The dashboard never implies trust where none exists. Unsigned bundles display warnings. Failed signatures display errors. Only fully verified bundles display as trusted.
Reviewer brief, trust semantics specification, copy-paste commands, canonical review artifacts. A technical evaluator can understand the system in 15 minutes.
What is hardened and what is not are both documented publicly. No inflated claims. The threat model and current limitations are available for review.
Run the live demo, request a guided walkthrough, or contact us for a security review.