Back to Protocol

Documentation.

PingCrypt is a terminal-first secure messaging protocol. This guide covers authentication, session management, and the encrypted packet lifecycle.

Quick Connectivity

The easiest way to use PingCrypt is by sourcing our shell helper into your environment. This enables high-level functions that abstract away complex curl commands.

Linux / macOS (Bash/Zsh)
$export PC_URL=""
$source <(curl -s $PC_URL/pc.sh)
Windows (PowerShell)
$$env:PC_URL = ""
$iex (iwr $env:PC_URL/pc.ps1).Content
Note: Windows users should use PowerShell. The pc.ps1 script provides identical functionality via Invoke-RestMethod.

Protocol Shortcuts

pc-login

Authentication

Initializes a secure session. Prompts for PingCrypt ID and Password. Tokens are cached in ~/.pc_session with 600 permissions for persistent CLI use.

pc-send <ID> "msg"

Transmission

Transmits an encrypted string to a receiver. AES-256-GCM encryption is applied server-side before storage.

pc-broadcast <IDs> "msg"

Broadcast

Sends a single message to multiple comma-separated IDs (limit: 10). Each recipient receives a unique cryptographic envelope.

pc-reply <MSG_ID> "msg"

Context

Replies to a specific message ID. The system automatically resolves the recipient from the original message metadata.

pc-inbox / pc-sent

Retrieval

Fetches your cryptographic logs. Sent messages are decrypted on the fly for your review.

pc-read <ID>

Marks a received packet as acknowledged.

pc-unsend <ID>

Sender-only: Flags a message as retracted globally.

pc-delete <ID>

Removes a message from your local view permanently.

Security Infrastructure

AES-256-GCM EncryptionMessages are encrypted using AES-GCM for both confidentiality and integrity protection. High-entropy initialization vectors prevent pattern recognition.

Rate Limiting & Anti-BruteEndpoints are protected by leaky-bucket rate limiting. Attempts are throttled by IP and UID to prevent automated crawling or brute-force attacks.

Hardened CLI ProtocolThe CLI scripts utilize stty for silent password input and manage session files with restricted OS permissions.

HSTS & CSP HeadersProduction builds enforce Strict-Transport-Security and restrictive Content-Security-Policies to neutralize XSS and session hijacking.

Initialize Identity

Protocol_Version_1.0.4