🔐 SMEP

Unbreakable Encryption • For The People • No Gatekeepers

Encrypt Message

0/16 characters

Decrypt Message

0/16 characters

A Tool For The People, Not The System

This is not a product. This is a weapon of sovereignty.

SMEP is unbreakable encryption that requires no permission, no infrastructure, no middleman, and no trust in any system. Download this file. Use it offline forever. No one can stop you.

Why This Matters

Every "secure" messaging app you've ever used has a fatal design flaw: someone else controls it.

  • Signal requires servers. Their servers. If they go down, you're silenced. If they're compelled by court order, you're exposed.
  • WhatsApp is owned by Meta. Do you really believe Facebook when they say they can't read your messages?
  • Telegram stores your data. On their servers. In their jurisdiction. Subject to their laws.
  • ProtonMail requires an account. Accounts can be frozen, seized, subpoenaed. Your "encrypted" email sits on their infrastructure.

The pattern is clear: If you depend on someone else's infrastructure, you are not free. You are permitted.

SMEP Is Different By Design

🔓 No Gatekeepers

Offline = Unstoppable. This HTML file runs in any browser. No app store approval. No server to shut down. No company to pressure. Copy it. Share it. Use it forever.

🔐 Mathematically Unbreakable

AES-256 with 2^256 possible keys. That's more combinations than atoms in the observable universe. The NSA uses this. You can too. No backdoors. No "lawful access." Pure math.

🌐 Platform Agnostic

Use any channel you want. Email, SMS, Discord, USB drive, shortwave radio, dead drop. The encrypted string works anywhere. They can't ban what they can't identify.

👤 Zero Identity

No accounts. No phone numbers. No tracking. You don't register. You don't log in. You don't exist in any database. Just download and use.

🔑 Flexible Key Distribution

You control who has access. One key for your team. Different key for each person. Rotate keys daily if you want. No central authority. No permission needed.

💻 Your Computer, Your Rules

All encryption happens locally. Your browser. Your machine. Nothing leaves unless you send it. Can't hack a server that doesn't exist.

This Is Not Theory - This Is Math

System Requires Infrastructure Can Be Shut Down Has Backdoors Tracks Users
Signal ✗ Yes (servers) ✗ Yes ✓ No ✗ Metadata
WhatsApp ✗ Yes (Meta servers) ✗ Yes ✗ Unknown ✗ Yes
Telegram ✗ Yes (servers) ✗ Yes ✗ Unknown ✗ Yes
Encrypted Email ✗ Yes (servers) ✗ Yes ✗ Depends ✗ Account data
SMEP ✓ No ✓ No ✓ No ✓ No

Real Use Cases

  • Activists: Organize without creating traceable accounts or metadata trails
  • Journalists: Protect sources from subpoenas and server seizures
  • Whistleblowers: Share truth without leaving digital fingerprints
  • Dissidents: Communicate in countries where encryption is banned (they can't ban math)
  • Communities: Build resilient networks that can't be shut down by deplatforming
  • Anyone: Talk freely without corporate or government surveillance

How It Works

  1. Download this HTML file. That's it. You now have unbreakable encryption forever.
  2. Create a shared key. 16+ characters. Share it with your network however you want (in person, encrypted channel, written note).
  3. Encrypt your message. Type it, click encrypt. Get an encrypted string.
  4. Share encrypted string anywhere. Email, SMS, public forum, billboard - doesn't matter. Without the key, it's random noise.
  5. Recipients decrypt with the same key. That's it. No accounts. No apps. Just math.

⚠️ With Great Power Comes Great Responsibility

No one can recover lost keys. Not us. Not anyone. Write them down. Store them safely. This is the price of true sovereignty - you are fully responsible for your own security.

If you lose a key, those messages are gone forever. This is not a bug. This is mathematical certainty. No backdoors means no backdoors for you either.

Technical Specifications

  • Algorithm: AES-256-GCM (Galois/Counter Mode) - NSA Suite B approved
  • Key Space: 2^256 possible keys (115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,913,129,639,936 combinations)
  • Key Derivation: PBKDF2 with 100,000 iterations (prevents brute force attacks)
  • Authentication: Built-in GCM authentication tag (tamper-proof - any modification breaks decryption)
  • Randomization: Cryptographically secure random salt and IV for each message
  • Implementation: Web Crypto API (browser-native, hardware-accelerated)

The Philosophy

Freedom requires tools that can't be taken away.

Signal is a great app. But it requires Signal's servers. ProtonMail is great. But it requires ProtonMail's infrastructure. Every centralized system, no matter how well-intentioned, is a single point of failure - and a single point of control.

SMEP has no single point of failure because it has no points at all. It's pure mathematics running on your machine. Download it once. Use it forever. Share it freely. No one can stop you.

This is what digital sovereignty looks like: tools that belong to people, not platforms.

This Tool Is Free. Forever.

No premium tiers. No "pro" features. No subscription. No monetization. No data collection to sell. No investors to satisfy. No exit strategy.

Why? Because the point is freedom, not profit. Copy this file. Modify it. Share it. Build on it. Make it better. It's yours.

🔬 Verify The Code Yourself

Don't trust us. Don't trust anyone. Right-click → View Source. Read every line. The entire encryption engine is visible. No hidden tracking. No secret network calls. No telemetry. Just math.

This is open cryptography. The algorithm is public. The implementation is visible. The security comes from mathematical impossibility, not secrecy.

Version: SMEP 2.0 - Sovereignty Edition
Created: January 2026
Author: Kevin L. Brown
Website: CreationUnified.com
Framework: Unified Informational Physics Ontology
License: Free to use, modify, and distribute