
SECURE THE
QUANTUM FUTURE
Post-quantum cryptographic toolkit with natural language AI. Just talk to Anubis—sign contracts, register deeds, create wills, anchor to blockchain. Powered by SpoonOS. Anchored on Neo N3.
You:
CRYPTOGRAPHIC ALGORITHMS
Built on NIST-standardized post-quantum cryptography with CNSA 2.0 compliance.
ALGORITHM SPECIFICATIONS
| Component | Algorithm | Standard | Security Level |
|---|---|---|---|
| Digital Signatures | ML-DSA-87 | FIPS 204 | NIST Level 5 (256-bit quantum) |
| Key Encapsulation | ML-KEM-1024 | FIPS 203 | NIST Level 5 (256-bit quantum) |
| Symmetric Encryption | AES-256-GCM | FIPS 197 | 256-bit classical |
| Streaming Cipher | XChaCha20-Poly1305 | RFC 8439 | 256-bit classical |
| Hashing | SHA-512, SHA3-256 | FIPS 180-4, FIPS 202 | 256-bit classical |
| Key Derivation | Argon2id, HKDF-SHA512 | RFC 9106, RFC 5869 | Memory-hard |
CNSA 2.0 PROFILE
Default - NIST Level 5
- •NSA Commercial National Security Algorithm Suite 2.0
- •Approved for government and NSS systems post-2030
- •ML-DSA-87 signatures (4,627 bytes)
- •ML-KEM-1024 encryption (1,568 bytes)
- •SHA-512 hashing
BALANCED PROFILE
NIST Level 3
- •~40% smaller keys for constrained environments
- •ML-DSA-65 signatures (3,309 bytes)
- •ML-KEM-768 encryption (1,184 bytes)
- •SHA-384 hashing
FIPS 140-3 PROFILE
Regulated Industries
- •FIPS-validated cryptographic module (aws-lc-rs)
- •Required for regulated industries
- •Healthcare, finance, government compliance
JUST TALK TO ANUBIS
A production-grade natural language cryptography platform with four-layer fee defense, formal verification, RON compliance (47 states), and 64+ operations. Speak naturally—the AI handles everything.
FOUR-LAYER FEE DEFENSE
Bulletproof fee collection with formal verification. 8 theorems proven in Coq. Fee bypass is mathematically impossible.
FeeGate
Pre-flight balance check before any operation. Blocks insufficient funds immediately.
FeeEscrowManager
Multi-step workflow fee reservation. 11 workflows including marriage (1.20 GAS).
RetryFeeManager
Transient failure handling with exponential backoff. Auto-retry on network errors.
FeeMonitor
Real-time anomaly detection. 8 anomaly types flagged automatically.
FORMALLY VERIFIED (Coq)
518-line Coq proof specification. 8 of 11 theorems fully proven including fee_always_collected, no_fee_bypass, and balance_decreases.
MODULE ARCHITECTURE
15 specialized modules with clear separation of concerns. 275 classes, 1,043 functions.
MODULE BREAKDOWN
| Module | Lines | Purpose |
|---|---|---|
| tests/ | 11,957 | 798 test functions, 100% pass rate |
| handlers/ | 7,045 | Intent handlers for all 64+ operations |
| business/ | 5,794 | Fee collection, subscriptions, payments |
| security/ | 4,241 | Audit trails, anomaly detection, advisors |
| react/ | 4,151 | ReAct reasoning loop implementation |
| compliance/ | 4,121 | RON (47 states), MISMO, notary tracking |
| conversation/ | 2,646 | Natural language flow templates |
| nlp/ | 853 | 200+ intent patterns, 28 categories |
| i18n/ | 703 | 6 languages (EN, ES, ZH, FR, DE, JA) |
NATURAL LANGUAGE PROCESSING
200+ regex patterns across 28 command categories. Sophisticated linguistic understanding that rivals commercial NLP products.
INTENT CLASSIFICATION
200+ regex patterns organized by priority. More specific patterns evaluated first to prevent false matches. Handles variations like "dead man", "deadman", "dead-man switch" automatically.
# Pattern priority prevents false matches
"check in to my dead man switch"
→ heartbeat (check-in operation)
"if I don't check in, release to my wife"
→ escrow_deadman (dead man creation)
ANAPHORA RESOLUTION
Understands pronouns using conversation context. When you say "anchor it", the system knows "it" refers to the document you just signed.
You: Sign my contract
Anubis: *signs contract.pdf*
You: Anchor it
Anubis: *resolves "it" → contract.pdf*
PARAMETER EXTRACTION
Extracts structured data from messy natural language. Handles file paths, prices, dates, Neo addresses, and relationship terms automatically.
"sell my contract for 5 GAS"
→ {sealed_file: "contract.pdf", price: 5.0}
"release to my wife in 30 days"
→ {beneficiary: "wife", release_date: "2026-02-10"}
INTELLIGENT ERROR RECOVERY
Transforms cryptic technical errors into helpful human guidance. Suggests fixes, offers retry options, and guides users through resolution.
Before: "Error: ENOENT: no such file"
After: "I couldn't find that file. Tell me the name and I'll search for it."
COMPLIANCE & SECURITY
Production-ready legal compliance for Remote Online Notarization (RON) in 47 US states. MISMO compliance for mortgage industry.
RON COMPLIANCE
State-specific requirements for all 47 RON-enabled states. Video recording, ID verification, notary seal, and retention policies.
AUDIT TRAILS
Comprehensive audit logging with blockchain anchoring. Chain of custody tracking, witness attestation, and video session management.
- • User requests logged
- • Tool invocations tracked
- • Outcomes recorded
- • Timestamps at each step
ANOMALY DETECTION
Real-time monitoring for suspicious patterns. 8 anomaly types with configurable thresholds.
- • HIGH_VOLUME
- • RAPID_OPERATIONS
- • BYPASS_ATTEMPT
- • FREE_OP_ABUSE
64+ OPERATIONS
Complete notary toolkit covering documents, escrows, marketplace, vault, ceremonies, and more.
+ 40 more operations including contract_amend, will_revoke, deed_transfer, member_mint, privatebatch_keygen...
MULTI-LANGUAGE SUPPORT
Automatic language detection and translation. Speak in your native language—Anubis understands.
POWERED BY NEO N3
Built exclusively on Neo N3 for enterprise-grade blockchain anchoring with dBFT consensus finality.
NEO N3 CAPABILITIES
Document Anchoring
Immutable blockchain timestamps with dBFT finality
~0.01-0.05 GAS
NeoFS Storage
Decentralized file storage with ML-KEM encryption
~0.02 GAS/MB
NFT Membership
Three-tier membership with on-chain benefits
50-200 GAS/year
Smart Contracts
Marriage, escrow, marketplace, and governance
Varies by operation
CORE CAPABILITIES
Sign files with ML-DSA-87 (FIPS 204), providing NIST Level 5 security against quantum attacks.
Seal sensitive data using ML-KEM-1024 (FIPS 203). Auto-upload to NeoFS for decentralized storage.
Immutable timestamps on Neo N3 with dBFT 2.0 one-block finality. Batch anchoring for cost efficiency.
Marriage contracts, wills, property deeds, business contracts with amendments. All blockchain-anchored.
Dual-Key Quantum-Safe Identity with on-chain registration, rotation, and revocation.
NEP-11 compliant NFT rings for marriages. Mint, burn on divorce, update vows on anniversaries.
20 command groups: sign, attest, anchor, marriage, will, deed, contract, journal, multisig, and more.
Decentralized storage with parallel multipart uploads. Auto-upload sealed files to NeoFS.
Collaborative anchoring with ML-KEM key shares. Only Merkle root is public. Forward secrecy.
Threshold governance with t-of-n signatures. Propose, vote, execute with on-chain coordination.
Tamper-evident record keeping. Export to PDF, CSV, JSON. Batch anchor journal entries.
Integration with external Timestamp Authorities. Request and verify RFC 3161 responses.
[+] Generating ephemeral session key (ChaCha20-Poly1305)
[+] Splitting key into 3 shares (Shamir Secret Sharing)
[+] Encapsulating shares with ML-KEM-1024
[+] Anchoring Merkle root to Neo N3 Blockchain
PRIVACY-PRESERVING
COLLABORATIVE ANCHORING
A revolutionary integration of ML-KEM-1024 that enables forward-secure, private batch anchoring. Multiple parties contribute encrypted "key shares" to secure receipts before they touch the blockchain.
- Off-Chain PrivacyEncrypted receipts are shared privately; only the Merkle root is public.
- Forward SecrecyEphemeral keys ensure past data remains secure even if long-term keys are compromised.
- Threshold RecoveryRequires t-of-n parties to reconstruct keys and decrypt data.
ADVANCED ESCROW WITH NATURAL LANGUAGE
Anubis Notary supports four sophisticated escrow patterns, all accessible through natural language via SpoonOS. Protect assets, automate releases, and coordinate multi-party approvals—just by talking.
TIMELOCK ESCROW
Release assets at a specific date/time
Lock files, documents, or secrets until a specified date. Perfect for embargoed releases, scheduled announcements, or time-delayed inheritance transfers.
Natural Language:
"Lock this document until January 1st, 2027"
→ escrow_timelock
DEAD-MAN SWITCH
Release if you stop checking in
Assets are released to beneficiaries if you fail to check in within a specified interval. Perfect for digital inheritance, emergency access, or insurance against incapacitation.
Natural Language:
"If I don't check in for 30 days, release my vault to my children"
→ escrow_deadman
PAYMENT-GATED
Release upon payment confirmation
Assets are released only when a specific payment is confirmed on-chain. Perfect for pay-to-unlock content, conditional sales, or escrow services.
Natural Language:
"Release this file when Alice pays 100 GAS"
→ escrow_payment
MULTI-SIG ESCROW
Release requires multiple approvals
Assets require t-of-n signatures to release. Perfect for corporate governance, joint accounts, or trustee-controlled assets.
Natural Language:
"Require 2 of 3 board members to release company funds"
→ escrow_multisig
CONVERSATIONAL ESCROW SETUP
Setting up a dead-man switch through natural conversation
You:
"I want to set up a dead-man switch for my crypto wallet keys"
Anubis:
"I'll help you create a dead-man switch. This will:
• Encrypt your wallet keys
• Require periodic check-ins from you
• Release to beneficiaries if you miss check-ins
Who should receive the keys if you don't check in?"
You:
"My wife Sarah and my brother Mike"
Anubis:
"Got it. How often should I expect a check-in from you?"
You:
"Every 30 days"
Anubis:
"Perfect. Here's your dead-man switch configuration:
• Asset: wallet_keys.enc (encrypted)
• Check-in interval: 30 days
• Beneficiaries: Sarah, Mike
• Release: Both receive decryption key
Cost: 0.25 GAS (~$0.10). Proceed? [Yes/No]"
You:
"Yes"
Anubis:
"✓ Dead-man switch activated!
• Escrow ID: ESC-2026-0111-7A3B
• Next check-in due: February 10, 2026
I'll remind you 3 days before each deadline. Just say 'I'm still here' to check in."
MORE ESCROW EXAMPLES
"Lock until my 18th birthday"
→ escrow_timelock
"Release when invoice is paid"
→ escrow_payment
"Need 3 of 5 trustees to approve"
→ escrow_multisig
"If I'm gone, give this to my kids"
→ escrow_deadman
"Embargo until press release date"
→ escrow_timelock
"Unlock when buyer sends 50 GAS"
→ escrow_payment
"Both parents must approve"
→ escrow_multisig
"Check in weekly or release"
→ escrow_deadman
ESCROW SETUP FEES
- Timelock escrow0.25 GAS
- Dead-man switch0.25 GAS
- Payment-gated0.25 GAS
- Multi-sig escrow0.50 GAS
ESCROW OPERATIONS
- Check-in (dead-man)FREE
- Add signer (multisig)0.10 GAS
- Approve releaseFREE
- Cancel escrow0.10 GAS
MEMBERSHIP BENEFITS
- Free tierNo escrow
- Notary (50 GAS/yr)Timelock only
- Vault (200 GAS/yr)All 4 patterns
1 GAS ≈ $0.40 USD
FORMAL VERIFICATION
We don't just write code; we prove it. Anubis Notary uses state-of-the-art formal methods to ensure mathematical correctness with 34+ verified pure functions and 6 LibFuzzer targets for continuous testing.
CRYPTO PRIMITIVES
Built on the bedrock of NIST-standardized post-quantum algorithms (FIPS 203 & 204).
PERFORMANCE BENCHMARKS
Measured on modern hardware. All cryptographic operations are constant-time and formally verified.
CRYPTOGRAPHIC OPERATIONS
| Operation | Time | Memory |
|---|---|---|
| Key generation | ~100ms | 1-4 GiB |
| Sign (ML-DSA-87) | ~5ms | ~10 MB |
| Verify (ML-DSA-87) | ~2ms | ~5 MB |
| ML-KEM encapsulate | ~1ms | ~2 MB |
| ML-KEM decapsulate | ~1ms | ~2 MB |
| SHA3-256 (1 MB) | ~5ms | ~1 KB |
NEO N3 ANCHORING
| Operation | Time | Cost |
|---|---|---|
| Single Anchor | ~15s | ~0.01 GAS |
| Batch Anchor (8) | ~15s | ~0.012 GAS |
| Identity Register | ~15s | ~0.02 GAS |
dBFT 2.0: ONE-BLOCK FINALITY
Neo N3's Delegated Byzantine Fault Tolerance provides immediate, irreversible finality in a single block (~15 seconds). No confirmations needed—once anchored, your document proof is permanently immutable.
$ anubis-notary anchor neo anchor document.pdf
NEO N3 BLOCKCHAIN INTEGRATION
Anubis Notary leverages Neo N3's dBFT 2.0 consensus for one-block finality, NeoFS for decentralized storage, and smart contracts for immutable anchoring.
dBFT 2.0 CONSENSUS
Delegated Byzantine Fault Tolerance provides one-block finality—no waiting for confirmations. Once anchored, it's permanent.
Block: 245,102 (Final)
NOTARY ORACLE V2
Smart contract deployed on TestNet (0xff099c61...) handles anchoring, batch operations, and Quantum-Safe Identity (QSI) registration.
NEOFS STORAGE
Decentralized object storage with S3-compatible API, content-addressed (CID) files, and automatic ML-KEM-1024 encryption.
neofs-store doc.pdf --encrypt
[+] Encrypted with ML-KEM-1024
DUAL-KEY QSI (DK-QSI)
Bind ML-DSA-87 (signing) and ML-KEM-1024 (encryption) into a single on-chain identity. Enables private batch participation and threshold cryptography.
[+] Generating ML-DSA-87 keypair...
[+] Generating ML-KEM-1024 keypair...
[+] Binding keys with signature...
[+] DK-QSI ID: ML-DSA-87:ML-KEM-1024:<fp>
[+] Registering on Neo N3 TestNet...
[✓] Identity anchored (TX: 0xabc...)
PRIVATE BATCH PROTOCOL
Multiple parties contribute receipts without revealing data. Uses Shamir Secret Sharingand threshold decryption (t-of-n recovery).
NEO NAME SERVICE (NNS)
Resolve human-readable .neo domains to addresses, contract hashes, or NeoFS CIDs.
Address: NbWpv2WLyyqXz4Y5T5uzMgfdsaZSzxsC2S
NeoFS CID: bafybeigdyrzt5...
SMART CONTRACT FUNCTIONS
NotaryOracleV2 contract on Neo N3 TestNet: 0xff099c61be9e5b0e1fbcfa9a785e39282adb4057
ANCHORING FUNCTIONS
IDENTITY FUNCTIONS
NEOFS COMMANDS
BATCH QUEUE SYSTEM
Queue receipts locally, submit as single transaction for 8x cost reduction.
CRYPTOGRAPHIC THRESHOLD AUTHORITY (CTA)
Your ML-KEM-1024 decryption fingerprint becomes your CTA, enabling threshold cryptography and reverse identity lookup.
Status: Active
WALLET INTEGRATION
COMPLETE WORKFLOW
LIVE NEO N3 ANCHORS
No recent anchor activity
Scanning last 200 blocks on TestNet
MERKLE WITNESS GENERATION
Batch anchoring creates a Merkle tree structure, allowing independent verification of individual receipts without revealing the entire batch. Each receipt includes a Merkle witness (proof path) for cryptographic verification.
$ anubis-notary anchor neo batch \
doc1.pdf doc2.pdf doc3.pdf
[+] Computing Merkle root...
[+] Generating witnesses...
[✓] Batch anchored (ID: 42)
$ anubis-notary verify doc1.anb
[+] Verifying Merkle proof...
[+] Root: 0xabc123...
[+] Witness path: [0x1, 0x2]
[✓] Valid (Block: 245,102)
NEOFS ADVANCED FEATURES
S3 GATEWAY (UP TO 5GB)
AWS S3-compatible API with multipart uploads, parallel streams (4 concurrent), and resume support for interrupted transfers.
$ anubis-notary neofs s3-upload \
large-file.zip --multipart
[+] Uploading in 4 streams...
CHUNKED MANIFESTS (>20MB)
Automatic 16MB chunk splitting for large files with JSON manifest tracking all chunk CIDs for reassembly.
$ anubis-notary neofs upload \
video.mp4 --chunked
[+] Split into 5 chunks
BEARER TOKEN AUTH
Two signing schemes: WalletConnect (80-byte with salt) and NeoFS Standard (65-byte with 0x04 prefix).
WalletConnect: [32B salt || 48B sig]
NeoFS Std: [0x04 || 64B sig]
CONTAINER MANAGEMENT
Create containers with placement policies and GAS deposits for decentralized storage quotas.
$ anubis-notary neofs container \
create --deposit 10
SECURITY FEATURES
TIMING ATTACK PROTECTION
Constant-time operations prevent side-channel leakage of secret keys:
result = a.len ^ b.len
for i in 0..min_len:
result |= a[i] ^ b[i]
return result == 0
MEMORY DISCLOSURE PROTECTION
Automatic zeroization of sensitive data on drop prevents memory scraping attacks:
impl Drop for SecretKey {
fn drop(&mut self) {
self.bytes.zeroize();
}
}
REPLAY ATTACK PROTECTION
Timestamps and deterministic nonces prevent replay of signed documents:
nonce = SHAKE256(
key_id ||
counter ||
timestamp
)
HSM SUPPORT
PKCS#11 integration for hardware security modules in enterprise environments:
$ anubis-notary key init \
--hsm-module /usr/lib/pkcs11.so \
--hsm-slot 0
RATE LIMITING
Per-caller, per-block limits prevent DoS attacks (~15s reset):
FRONT-RUNNING PROTECTION
Signature commitments prove key ownership before registration:
commitment = SHA-256(
domain_tag ||
fingerprint ||
tx.Sender
)
GAS COST BREAKDOWN
| OPERATION | COST (GAS) | USD @ $10/GAS |
|---|---|---|
| Single Anchor | ~0.01 | $0.10 |
| Batch Anchor (8 roots) | ~0.012 | $0.12 |
| Register Identity | ~0.02 | $0.20 |
| Register Dual-Key Identity | ~0.025 | $0.25 |
| Create Collaborative Batch | ~0.03 | $0.30 |
| Submit Share | ~0.01 | $0.10 |
IDENTITY LIFECYCLE & W3C DID
STATE TRANSITIONS
Key rotation creates chains: fp1 → fp2 → fp3. All old fingerprints resolve to the latest active key.
W3C DID FORMAT
did:anubis:neo:testnet:<fingerprint>
did: W3C DID scheme
anubis: Method name
neo: Blockchain
testnet: Network
<fp>: SHA-512 fingerprint
$ anubis-notary neo identity resolve \
did:anubis:neo:testnet:abc123...
[✓] Status: ACTIVE
ON-CHAIN EVENTS
Subscribe to real-time Neo N3 events emitted by the NotaryOracleV2 smart contract for monitoring and automation.
| EVENT | PARAMETERS | DESCRIPTION |
|---|---|---|
| RootAnchored | anchorId, root, blockHeight, txHash | Single root anchored |
| BatchAnchored | anchorIds[], roots[] | Batch of roots anchored |
| IdentityRegistered | fingerprint, blockHeight | New QSI identity |
| IdentityRevoked | fingerprint, reason | Identity revoked |
| IdentityRotated | oldFp, newFp | Key rotation |
| DualKeyIdentityRegistered | signingFp, decryptionFp, blockHeight | New DK-QSI |
| CollaborativeBatchCreated | batchId, threshold, total, participants[] | New batch |
| BatchDecryptable | batchId, currentShares, threshold | Threshold reached |
WALLET MANAGEMENT
Create, import, and manage Neo N3 wallets with balance checking and GAS management.
$ anubis-notary neo wallet create
$ anubis-notary neo wallet address
$ anubis-notary neo wallet balance
[✓] Balance: 10.5 GAS
NEO NAME SERVICE (NNS)
Resolve human-readable .neo domains to Neo addresses and vice versa.
$ anubis-notary neo nns-resolve
example.neo
[✓] Address: NXabc...
$ anubis-notary neo nns-reverse
NXabc...
[✓] Domain: example.neo
CNSA 2.0 COMPLIANT
Meets NSA's Commercial National Security Algorithm Suite 2.0 requirements for post-quantum cryptography.ML-DSA-87, ML-KEM-1024,SHA-512, and ChaCha20Poly1305provide defense-grade security.
INSTALLATION
QUICK INSTALL (LINUX/MACOS)
curl -LO https://github.com/AnubisQuantumCipher/anubis-notary/releases/download/v0.4.2/anubis-notary-linux-x86_64 &&
chmod +x anubis-notary-linux-x86_64 &&
./anubis-notary-linux-x86_64 --version
SUPPORTED PLATFORMS
- Linux (x86_64, ARM64)v0.4.2
- macOS (Intel, Apple Silicon)v0.4.2
- Windows (x86_64)v0.4.2
BUILD FROM SOURCE
Requires Rust 1.75+ and Cargo.
FILE ENCRYPTION
Encrypt files for yourself or a single recipient using post-quantum ML-KEM-1024 key encapsulation with ChaCha20Poly1305 symmetric encryption.
# Generate ML-KEM-1024 keypair
$ anubis-notary private-batch keygen --out mykey
# Seal (encrypt) a file
$ anubis-notary seal document.pdf --recipient mykey.mlkem.pub --out document.sealed
# Unseal (decrypt) with secret key
$ anubis-notary unseal document.sealed --secret-key mykey.mlkem.sec --out document.pdf
STREAMING OPERATIONS
Process large files efficiently with streaming operations. Hash, sign, and verify multi-gigabyte files without loading them entirely into memory.
# Hash large files efficiently
$ anubis-notary stream hash large-file.iso
# Stream sign
$ anubis-notary stream sign large-file.iso -o large-file.sig
# Stream verify
$ anubis-notary stream verify --sig large-file.sig large-file.iso
MULTI-SIGNATURE GOVERNANCE
Implement t-of-n threshold governance for critical operations. Require multiple parties to approve actions before execution.
# Initialize 2-of-3 multisig
$ anubis-notary multisig init --threshold 2 \
--signers signer1.pub,signer2.pub,signer3.pub \
-o multisig.config
# Create proposal
$ anubis-notary multisig propose --config multisig.config \
--proposal-type authorize-action --data <hex> -o proposal.bin
# Sign proposal
$ anubis-notary multisig sign --config multisig.config \
--proposal proposal.bin
# Execute when threshold met
$ anubis-notary multisig execute --config multisig.config \
--proposal proposal.bin
KEY ROTATION
Rotate signing keys while maintaining identity continuity. Archive old keys securely and revoke compromised keys with cryptographic proofs.
# Rotate keys (archives old key)
$ anubis-notary key rotate
# Revoke a key
$ anubis-notary key revoke <fingerprint> \
--reason "key compromised"
# List archived and revoked keys
$ anubis-notary key list
# Show current key
$ anubis-notary key show
LEGAL DOCUMENT ECOSYSTEM
Beyond simple document signing. A complete legal infrastructure for the quantum age.
MARRIAGE
Blockchain-anchored marriage contracts with NFT rings. Supports monogamy and polygamy templates.
$ anubis marriage create
$ anubis marriage add-party
$ anubis marriage sign
$ anubis marriage anchor
$ anubis rings mint
WILLS
Quantum-secure wills with witness signatures, codicils, and revocation. Tamper-evident storage.
$ anubis will create
$ anubis will add-witness
$ anubis will add-codicil
$ anubis will sign
$ anubis will revoke
DEEDS
Property deeds with chain of title tracking. Transfer ownership with cryptographic proof.
$ anubis deed create
$ anubis deed transfer
$ anubis deed history
$ anubis deed verify
$ anubis deed anchor
CONTRACTS
Business contracts with amendments, multi-party signatures, and version history.
$ anubis contract create
$ anubis contract add-party
$ anubis contract amend
$ anubis contract sign
$ anubis contract anchor
JOURNALS
Tamper-evident notary journals. Export to PDF, CSV, JSON. Batch anchor entries.
$ anubis journal create
$ anubis journal add-entry
$ anubis journal export --pdf
$ anubis journal anchor
$ anubis journal verify
LICENSES
Cryptographic software licenses with expiration, feature flags, and revocation.
$ anubis license issue
$ anubis license verify
$ anubis license revoke
$ anubis license list
$ anubis license export
DATA MARKETPLACE
Sell sealed data on-chain with post-quantum encryption. Two-phase delivery prevents front-running. ML-KEM-1024 key exchange ensures only buyers can decrypt purchased content.
- List Sealed DataEncrypt and list data for sale with price in GAS.
- Two-Phase DeliveryBuyer pays, seller delivers key, prevents front-running.
- Revenue ClaimsSellers claim accumulated revenue from all sales.
list_sealed_data(price, neofs_cid, metadata)
purchase_access(listing_id, buyer_pk)
deliver_access(purchase_id, encrypted_key)
claim_revenue(seller_address)
get_listing(listing_id)
get_purchase(purchase_id)
get_pending_deliveries(seller)