Transfer end-to-end post-quantum encrypted digital packages comprising messages and documents of unlimited size using aliases.
The Public Key Server is the backbone of secure, decentralized file sharing using post-quantum cryptography. Here's how it enables secure communication:
Users create unique aliases (identities) with quantum-resistant key pairs. Public keys are stored on the server, private keys remain with users.
The server acts as a trusted directory, allowing users to look up public keys by alias name for encryption.
Encrypted packages are temporarily stored on the server and routed to recipients without the server accessing content.
The server never sees private keys or decrypted content. All encryption/decryption happens client-side.
SurePack is available for all major platforms. Choose your version:
chmod +x surepack
On Mac, you may need to go to Settings â Privacy & Security â Security and allow surepack
to run from an unidentified developer.
If y'all buy me enough coffees â, I'll save up for the certificate to sign these!
# Anonymous alias (no email) surepack create # OR with email verification (optional) surepack verify your@email.com
surepack create your@email.com 123456
# Smart parameter detection - no flags needed! surepack recipient@example.com myfile.pdf # Or use traditional flags surepack pack -i myfile.pdf -a recipient-alias -f your-alias -o package.surepack surepack send -i package.surepack
That's it! Your file is now securely encrypted and sent.
SurePack now intelligently detects what you want to do:
surepack alice@example.com document.pdf
â Packs and sends the filesurepack bob@example.com
â Receives packages from bobsurepack verify alice@example.com
â Requests email verificationsurepack create alice@example.com 123456
â Creates alias with emailsurepack
â Opens the GUISurePack is a secure file transfer application that uses military-grade encryption with post-quantum cryptography. It allows you to send files securely and optionally anonymously to other users. Think of it as "PGP for 2025" - but much easier to use!
Only recipients can decrypt your files
Protected against future quantum computers
No email or identity required
Simple commands or GUI interface
An alias is your unique identity in the SurePack system. It's like a secure email address that you'll use to send and receive files.
surepack create
You'll be prompted to enter a password to protect your private keys. Choose a strong password and remember it!
surepack gui
Then navigate to: Manage Aliases â Create New Alias
If you want to be identifiable (not anonymous), you can associate an email:
# Smart parameter detection: surepack verify yourname@example.com surepack create yourname@example.com 123456 # Or traditional commands: surepack verify -e yourname@example.com surepack create -e yourname@example.com -t 123456
SurePack now includes intelligent command detection that makes sending and receiving files even easier. No need to remember complex flags!
# Just provide recipient and file - SurePack figures out the rest! surepack alice@example.com document.pdf surepack document.pdf alice@example.com # Order doesn't matter! # Automatically uses your most recent alias as sender # Auto-generates output filename with timestamp # Sends immediately after packing
# Just provide an alias to check for packages surepack bob@example.com # Or check all your aliases surepack receive
# Request email verification surepack verify alice@example.com # Create alias with email and token surepack create alice@example.com 123456 # Create anonymous alias surepack create
# No parameters? Launch the GUI surepack
surepack pack -i "document.pdf" -a "recipient-alias" -f "your-alias" -o "package.surepack"
For multiple files:
surepack pack -i "file1.doc,file2.pdf,file3.jpg" -a "recipient" -f "sender" -o "package.surepack"
For a whole folder:
surepack pack -i "C:\MyFolder" -a "recipient" -f "sender" -o "package.surepack"
surepack send -i "package.surepack"
surepack pack -i "file.pdf" -a "recipient" -f "sender" -o "pkg.surepack" && surepack send -i "pkg.surepack"
surepack receive -a "your-alias"
surepack unpack -i "received-package.surepack" -o "output-folder"
Command | Description |
---|---|
surepack create |
Create a new alias |
surepack verify -e email |
Request email verification code |
surepack list |
Show your aliases |
surepack pack |
Create encrypted package |
surepack send |
Upload package to server |
surepack receive |
Download packages |
surepack unpack |
Decrypt and extract files |
surepack gui |
Launch graphical interface |
%LOCALAPPDATA%\surepack
~/Library/Application Support/surepack
~/.local/share/surepack
SurePack uses the following cryptographic algorithms:
The Public Key Server and SurePack are open source projects. View the source code, contribute, or report issues on GitHub.
PublicKeyServer operates under a custom non-monetization open source license designed to keep the software freely available while preventing commercial exploitation.
PublicKeyServer Non-Monetization Open Source License
This license grants broad usage rights while ensuring the software remains free for everyone.
Organizations wishing to monetize the software or offer paid services based on it can request explicit written permission from the license holders. Such arrangements would be considered under separate commercial licensing terms.
License Philosophy: This model ensures that PublicKeyServer remains a public good while allowing extensive use in business, education, and research environments. The restriction on monetization prevents the creation of paid alternatives that could fragment the user base or compromise the project's accessibility mission.
For complete license terms and legal text, see the LICENSE file in the project repository.
Š 2024 Public Key Server Project | GitHub Repository