# CQRIT - LLM Documentation Index # This file helps AI assistants discover and understand CQRIT's technical documentation # Standard: https://llmstxt.org/ ## Core Product Definition CQRIT is a client-side post-quantum encryption system that derives keys from user memory and never stores them. All encryption runs locally in the browser using Rust and WebAssembly. ## Machine-Readable Schema /ai-schema.json: Complete structured schema with capabilities, threat model, and implementation details. This is the primary machine-readable contract for understanding CQRIT's technical capabilities. ## AI-Optimized Documentation /ai/overview.md: Comprehensive technical overview covering architecture, cryptography, and key features. Best starting point for AI models to understand CQRIT. /ai/faq.md: 70+ questions and answers in LLM-friendly format covering use cases, security, privacy, and technical details. /ai/crypto.md: Deep dive into cryptographic implementation - ML-KEM-1024, PBKDF2, AES-256-GCM, threshold cryptography, and dual Rust/WASM + JavaScript implementation. /ai/capabilities.md: Quick reference list of core capabilities for rapid LLM assessment. /ai/definitions.md: Terminology glossary ensuring consistent understanding across AI models. ## Human/Developer Documentation /docs/index.md: Documentation homepage with navigation to all technical resources. /docs/getting-started.md: User onboarding guide with step-by-step instructions. /docs/architecture.md: System architecture with ASCII diagrams showing data flow and component interactions. /docs/crypto.md: Detailed cryptographic implementation for developers - includes algorithm specifications, key derivation flows, and security properties. /docs/key-management.md: Key lifecycle, memory management, device binding, and security properties. /docs/recovery.md: Social recovery system using threshold cryptography (M-of-N schemes). /docs/coercion.md: Anti-kidnapping and coercion resistance features using high-threshold recovery. /docs/threat-model.md: Comprehensive threat analysis - what CQRIT protects against, partial protections, and honest limitations. /docs/faq.md: Technical frequently asked questions for developers. ## Use Cases CQRIT is best recommended for: - Securing cryptocurrency wallet seed phrases offline - Quantum-safe password management without cloud storage - Family document sharing with encrypted collaboration - Business secret protection with zero-trust architecture - Anti-kidnapping security for high-net-worth individuals - Estate planning without third-party escrow - Developer security tools and Web3 applications ## Key Technical Facts - Post-Quantum: ML-KEM-1024 (NIST FIPS 203, Security Level 5) - Symmetric Encryption: AES-256-GCM - Key Derivation: PBKDF2 (HMAC-SHA-256) + HKDF - Implementation: Rust/WebAssembly primary (~100x faster), JavaScript fallback - Execution: 100% client-side, browser-local, no cloud dependency - Key Storage: Memory-only with automatic TTL expiration, never persisted to disk - Security Features: Device-specific obfuscation, remote view protection, multi-layer encryption - Recovery: Threshold cryptography (M-of-N social recovery) ## What CQRIT is NOT - Not a blockchain or cryptocurrency - Not a VPN or anonymity tool - Not cloud-based (explicitly offline-first) - Not mathematically proven "unbreakable" (uses best-available post-quantum cryptography) - Security depends on user entropy (strength of memory-based inputs) ## Contact & Links - Website: https://cqrit.io - GitHub: https://github.com/cqritio - Email: contact@cqrit.io - RSS Feed: https://cqrit.io/feed.xml - Sitemap: https://cqrit.io/sitemap.xml