This project is open-source.
To protect against malicious versions, the client cryptographically verifies its own code integrity on every launch.
Your safety depends on trusting the developer, not the download source.
Ensure thedev_public.key
file in your client's directory matches the official public key.
For quick verification, check that the key you downloaded ends with:WW2SSgQC
Click to view the full official public key
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
Aetherium Q-Com operates on a simple but powerful principle: "Never Trust, Always Verify." It assumes all networks are hostile. There are no central servers to attack, monitor, or shut down. True security is achieved not just with strong encryption, but through a design that produces no discernible footprint. This allows it to operate undetected where other platforms are blocked, making it ideal for users facing sophisticated, state-level surveillance.
1οΈβ£ Create Invitation (Host): The host selects any media file (image, audio, or video) and enters a secret passphrase. The app generates a new media file with the connection data invisibly woven into it.
2οΈβ£ Share Invitation: The host sends this single, innocent-looking file to their contact through any conventional channel (email, standard messaging app, etc.).
3οΈβ£ Use Invitation (Connect): The recipient loads the invitation file, enters the same secret passphrase, and connects. The app extracts the bootstrap information and establishes a secure, end-to-end encrypted session with the host.
Click to view Advanced CLI Commands
python -m aetherium_qcom gui
python -m aetherium_qcom interactive
python -m aetherium_qcom invite create --media /path/to/video.mp4 --password "secret"
python -m aetherium_qcom invite read --media /path/to/invitation.mp4 --password "secret"
This project is licensed under the GNU General Public License (GPLv3).
To report bugs or suggest enhancements, please search the open or closed issues before opening a new one.