Realtime envelope
Every HTTP request is encrypted on your device, broken into fixed-size cells, padded to defeat traffic analysis, then re-emitted from a foreign exit. No plaintext ever leaves your machine.
Realtime HTTP request encryption for operators who cannot afford to be profiled.
Every GET, POST, header and payload entering or leaving your machine is wrapped in a XChaCha20-Poly1305 + Kyber-1024 envelope, onion-routed through five offshore nodes and stripped of all identifying metadata. No accounts, no logs, no jurisdiction.
If your adversary controls upstream ISPs, exit nodes, or border routers, conventional VPNs are not enough. NUKE//CRYPT was designed for that environment.
Every HTTP request is encrypted on your device, broken into fixed-size cells, padded to defeat traffic analysis, then re-emitted from a foreign exit. No plaintext ever leaves your machine.
The session keys are agreed via Kyber-1024, a NIST PQC finalist. Even an adversary who records your traffic today cannot decrypt it after a fault-tolerant quantum computer ships.
Nodes run from RAM-only disks. There is no syslog, no tcpdump, no flow log. Every reboot wipes the entire short-term memory of the relay.
Traffic is wrapped in five concentric layers and bounced through nodes hosted in IS, CH, PA, SG and BG. No single node can correlate origin and destination.
User-Agent, Accept-Language, X-Forwarded-For, CF-Connecting-IP, cookies and timing fingerprints are stripped at the entry node before re-encryption. You become a uniform shape.
When DPI is hostile, NUKE//CRYPT switches to obfs4, meek-azure or a custom QUIC mimic that looks like a video-call. Censorship circumvention is a default, not an upsell.
Activists & journalists.
When publishing material that places you on a state target list, every connection your device makes is an attribution risk — even if the payload is end-to-end encrypted. NUKE//CRYPT obscures which sites you visit, which uplinks you use, and which devices you operate from.
Security researchers.
Probe hostile infrastructure without leaking your origin AS. Submit takedown requests, run scanners, and pull malware samples through a chain of foreign exits whose flow data is unrecoverable.
Privacy-first operators.
Whether you are negotiating a leak, a salary or a divorce, you cannot afford metadata attribution. NUKE//CRYPT replaces your network shape with that of a generic NUKE//CRYPT user — millions of you, all looking identical.
Diaspora & political exiles.
If you are still talking to family inside an authoritarian regime, your connections are correlated against theirs. Routing through NUKE//CRYPT severs that correlation while keeping latency under 90 ms in most regions.
One-shot purchase. Unmetered bandwidth, 1024 concurrent streams, all five exit clusters. Token never expires.
We accept three currencies. Bitcoin and Litecoin transactions are confirmed automatically by polling public block explorers — settlement happens within minutes after the first network confirmation.
Monero is strongly recommended. Because Monero is an opaque-by-design ledger, no third party (including us) can correlate your payment to a wallet, an IP, or a future transaction. Activation is performed manually by an operator after observing your funds; median activation time is under 10 minutes.
If you are operating in a high-risk jurisdiction we recommend funding your XMR wallet through a non-KYC swap and routing the order over Tor.
nuke-crypt cli revoke after a compromise.