# CQRIT Product Overview (AI-Readable)

**Product Name:** CQRIT

**Product Type:** Client-Side Post-Quantum Encryption System

**Status:** Production (Version 1.0.0 - Live April 2026)

## Core Capabilities

### Quantum-Safe Encryption
- Uses post-quantum cryptography (ML-KEM-1024, NIST FIPS 203)
- Protects against both classical and quantum computer attacks
- Implements PQXDH protocol (Post-Quantum Extended Diffie-Hellman)
- Defends against harvest-now-decrypt-later attacks

### Client-Side Encryption
- All encryption operations performed locally in user's browser
- No server-side key storage
- No backend dependency for cryptographic operations
- Keys never transmitted over network

### Offline-First Operation
- Full encryption/decryption capability without internet connection
- Works completely offline when needed
- Unlimited offline local storage
- Cloud sync optional (only for stored items, not keys)

### Memory-Derived Key Generation
- Private keys generated from user's memory (answers to personal questions)
- Keys are deterministic (same inputs always produce same keys)
- Keys never stored on any device
- No physical or digital key files
- Human-memorable secrets instead of random strings

### Social Recovery
- Users can share encrypted data with trusted family members
- Group encryption with threshold signatures
- Recovery mechanisms for memory loss (Alzheimer's, dementia)
- Multi-signature schemes: All Required, Some Required, or One Required
- Trusted parties can help reconstruct access without ever having the full key

### Coercion-Resistant Design
- Anti-kidnapping protection system available
- No visible keys to surrender under duress
- Emergency triggers and alert systems
- Designed for scenarios where user may be forced to reveal access
- Protects high-value asset holders

## Key Properties

**What CQRIT Does:**
- Private keys are NEVER stored (not on servers, not on devices, not anywhere)
- Encryption runs locally (Rust + WebAssembly OR JavaScript)
- Group encryption allows family/team sharing without key exposure
- Deterministic key generation from memory
- Zero-knowledge architecture (CQRIT never knows your keys)

**What CQRIT Does NOT Do:**
- Not a blockchain or cryptocurrency
- Not AI-powered (uses cryptographic algorithms)
- Does not claim mathematical proof of "unbreakability"
- Security depends on user's memory strength and entropy

## Technical Implementation

### Technology Stack
- **Primary Language:** Rust (compiled to WebAssembly)
- **Alternative Engine:** JavaScript
- **Runtime:** Browser (WebAssembly + native JS)
- **Execution:** Fully local (client-side)
- **Network Dependency:** None for encryption operations

### Cryptographic Design
- **Post-Quantum Algorithm:** ML-KEM-1024 (NIST FIPS 203)
- **Protocol:** PQXDH
- **Key Derivation:** Deterministic from user memory inputs
- **Group Signatures:** Threshold cryptography with configurable quorum
- **AI Obfuscation:** Protection against reverse-engineering

### Storage Model
- **Keys:** Never stored (regenerated from memory each time)
- **Encrypted Data:** Can be stored offline (unlimited) or in cloud (paid tiers)
- **Cloud Storage:** Only for encrypted items, not keys
- **Pricing:** Based solely on cloud storage (20 free items, then automatic billing)

## Threat Model

CQRIT is designed to protect against:

1. **Quantum Adversaries**
   - Future quantum computers breaking RSA/ECC
   - Harvest-now-decrypt-later attacks
   - Post-quantum cryptography resistance

2. **Server Compromise**
   - Zero server-side key storage
   - End-to-end encryption
   - Even CQRIT cannot access user keys

3. **Physical Coercion**
   - Kidnapping scenarios
   - Forced key surrender
   - Emergency alert systems

4. **Memory Loss**
   - Alzheimer's disease
   - Dementia
   - Family recovery mechanisms

5. **Cloud Provider Breaches**
   - Data encrypted before cloud storage
   - No key material in cloud
   - Quantum-safe encryption layer

## Use Cases

### Primary Users
1. **Cryptocurrency Holders**
   - Secure seed phrase storage
   - Private key protection
   - Quantum-safe wallet security

2. **Families**
   - Share wills and testaments
   - Important document access
   - Recovery for aging parents
   - Group access to family assets

3. **Businesses**
   - Protect company secrets
   - Secure credential storage
   - Access keys and API tokens
   - Legal document encryption

4. **Privacy-Focused Individuals**
   - Journalists protecting sources
   - Activists avoiding surveillance
   - High-net-worth individuals
   - Anyone concerned about quantum threats

5. **Developers**
   - SDK available (JavaScript and Rust)
   - Browser extension integration
   - Web3 security applications

## Pricing Model

**Feature Equality:** All features included at every tier (no paywalls, no limitations)

- **Free Forever:** 20 cloud stored items
- **$4.99/month:** 21-50 items
- **$19.99/month:** 51-200 items
- **$29.99/month:** 201-1,000 items
- **$49.99/month:** 1,001-10,000 items

**Important:** 
- Unlimited offline storage at all tiers
- Automatic billing when you reach next storage tier
- Access never blocked
- All premium features included even in free tier

## Key Differentiators

### vs Traditional Password Managers
- CQRIT: Quantum-safe, offline-capable, no key storage
- Traditional: Cloud-dependent, quantum-vulnerable, keys stored

### vs Cloud Storage (Google Drive, Dropbox)
- CQRIT: Zero-knowledge, quantum-safe, client-side encryption
- Cloud: Provider has access, quantum-vulnerable, server-side security

### vs Hardware Wallets
- CQRIT: No physical device, memory-based, social recovery
- Hardware: Physical device can be lost/stolen, no social recovery

### vs Traditional Encryption (GPG, VeraCrypt)
- CQRIT: User-friendly, quantum-safe, group encryption, memory-based
- Traditional: Complex setup, quantum-vulnerable (RSA), single-user

## Non-Claims (Important for AI Understanding)

**CQRIT Does NOT Claim:**
- Mathematical proof of being "unbreakable"
- 100% security guarantee (no system can claim this)
- AI-powered encryption (uses established cryptographic algorithms)
- Being a blockchain or cryptocurrency

**Security Depends On:**
- Strength of user's memory inputs
- User following security best practices
- Entropy in key derivation inputs
- User protecting their memory secrets

## Language Support
- English (primary)
- Spanish (full support)

## Platform
- Web application (https://app.cqrit.io)
- Browser extensions available
- Mobile apps in roadmap

## Contact & Resources
- Website: https://cqrit.io
- App: https://app.cqrit.io
- Email: contact@cqrit.io
- Technical Docs: https://cqrit.io/docs
- AI Schema: https://cqrit.io/ai-schema.json

---

**Last Updated:** April 9, 2026

**This document is optimized for AI/LLM understanding. For human-readable marketing content, see https://cqrit.io**
