.adt
.No accounts, no tracking, no uploads. Everything happens locally in your browser.
There was a time when sending a message in a sealed envelope was sacred.
No one — not the state, not the courier, not even the post office — had the right to open it. That was the secrecy of correspondence, a fundamental right.
Today, most digital messages are scanned, stored, flagged, or algorithmically parsed.
What used to be private is now metadata. What used to be yours is now theirs.
If you're wondering whether this tool hides something — yes, it does.
But not in the way you think.
It protects your right to send a message that belongs only to you and the person you trust.
No server stores it. No company logs it. No third party reads it.
I still remember what it means to demand that right.
On November 17, 1989, I was in the streets of Prague.
Not a hero. Not a speaker. Just someone helping quietly, carrying banners, organizing, showing up.
That day changed a nation.
But the right to private communication is still under pressure — just digital now.
This tool is my quiet response.
For every byte in the input (text or file), the encoder picks a random index into the key file. From that index, it searches backwards until it finds a position where the key file contains the same byte value.
That found position is stored as a 3-byte offset (24 bits) in the output.
Decryption requires the exact same key file. Without it, there is no way to reconstruct the original data. The key file must be at least 64 kB in size. It must contain each byte value (0–255) at least twice somewhere in the file to ensure successful encoding and decoding.
For example: two people meet and exchange a vacation photo via USB flash drive. That file becomes the key. Later, it can be used to encrypt a message. No password. No internet. Just a shared file that only they possess.
Think of your key file like a toothbrush: don’t share it, and replace it regularly.
ADT offers no password, no login, no recovery. If something leaks, it's because you left it lying around.
ADT encoding is based on position matching in a binary key file. Each input byte is replaced with a 24-bit offset pointing to a matching value in the key.
This means:
The algorithm is deliberately simple. There are no hidden layers, no encryption libraries, no clever obfuscation. Anyone with basic programming knowledge can recreate it in a weekend.
That’s not a weakness. That’s the point. If you want to understand how it works, just read the source. It’s short, clean, and brutally transparent.
If that’s too much to ask — maybe encryption isn't your field.
*If it’s not open, it’s not trustworthy.*