ADT Manual – Advanced Data Trace-proof

1. Quick Start (without marketing nonsense)

  1. Select the text or file you want to encrypt.
  2. Choose a binary key file that meets the basic requirements (see section 4).
  3. Click Encode (for text) or Generate (for files).
  4. You’ll get either a Base64 block or a file with the extension .adt.
  5. To decode, just reverse the process using the exact same key file.

No accounts, no tracking, no uploads. Everything happens locally in your browser.

2. Why

There was a time when sending a message in a sealed envelope was sacred.
No one — not the state, not the courier, not even the post office — had the right to open it. That was the secrecy of correspondence, a fundamental right.

Today, most digital messages are scanned, stored, flagged, or algorithmically parsed.
What used to be private is now metadata. What used to be yours is now theirs.

If you're wondering whether this tool hides something — yes, it does.
But not in the way you think.

It protects your right to send a message that belongs only to you and the person you trust.
No server stores it. No company logs it. No third party reads it.

I still remember what it means to demand that right.
On November 17, 1989, I was in the streets of Prague.
Not a hero. Not a speaker. Just someone helping quietly, carrying banners, organizing, showing up.

That day changed a nation.
But the right to private communication is still under pressure — just digital now.

This tool is my quiet response.

3. How It Works (and Why It’s Cool)

For every byte in the input (text or file), the encoder picks a random index into the key file. From that index, it searches backwards until it finds a position where the key file contains the same byte value.

That found position is stored as a 3-byte offset (24 bits) in the output.

Decryption requires the exact same key file. Without it, there is no way to reconstruct the original data. The key file must be at least 64 kB in size. It must contain each byte value (0–255) at least twice somewhere in the file to ensure successful encoding and decoding.

4. Key File Rules

For example: two people meet and exchange a vacation photo via USB flash drive. That file becomes the key. Later, it can be used to encrypt a message. No password. No internet. Just a shared file that only they possess.

Think of your key file like a toothbrush: don’t share it, and replace it regularly.

5. Safety Principles

ADT offers no password, no login, no recovery. If something leaks, it's because you left it lying around.

6. Algorithm Overview

ADT encoding is based on position matching in a binary key file. Each input byte is replaced with a 24-bit offset pointing to a matching value in the key.

This means:

7. Even a moron could code this

The algorithm is deliberately simple. There are no hidden layers, no encryption libraries, no clever obfuscation. Anyone with basic programming knowledge can recreate it in a weekend.

That’s not a weakness. That’s the point. If you want to understand how it works, just read the source. It’s short, clean, and brutally transparent.

If that’s too much to ask — maybe encryption isn't your field.

*If it’s not open, it’s not trustworthy.*
Everything is, after all, at adt.cz/adt.html (Download in menu).