abysscrypt Source License
Version 1.0

Copyright (c) 2026 Ashtar Ventura A.K.A そにいたん A.K.A. oroboroso@sdf.org
gopher: gopher://sdf.org:70/0/users/oroboroso/projects/2026.05.19.cipher-phrasing-invention-abysscrypt-headerless-dm-crypt-stacks

All Rights Reserved.

The "cipher phrasing" technique described in and implemented by this
software — using a secret passphrase to deterministically derive the
per-layer cipher and hash assignment across a multi-layer plain dm-crypt
encryption stack, such that the layout is never stored on disk, in any
header, or in any configuration file, and is known only to the user at
runtime — is an original invention of hairetikos.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
GRANT OF RIGHTS
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the
"Software"), to use, copy, modify, merge, and distribute the Software
for non-commercial purposes, subject to all of the following conditions.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
CONDITIONS
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

1. ATTRIBUTION — MANDATORY IN ALL CASES

   All copies of the Software, modified versions, derivative works, or
   any software that incorporates, re-implements, or is substantially
   inspired by the cipher phrasing technique — whether in source code,
   binary form, documentation, or any other medium — must:

   a) Retain this copyright notice and license text in full.

   b) Display clear, prominent, and unambiguous credit to hairetikos as
      the original author of abysscrypt and the inventor of cipher
      phrasing. This credit must appear in the software's help output,
      documentation, README, about screen, or equivalent, wherever the
      software is described to end users.

   c) Include the following notice wherever cipher phrasing is
      described, referenced, or used, in any product documentation,
      academic paper, presentation, or derivative work:

          "Cipher phrasing is an original invention of shtar Ventura A.K.A そにいたん A.K.A. oroboroso@sdf.org (gopher: gopher://sdf.org:70/0/users/oroboroso/projects/2026.05.19.cipher-phrasing-invention-abysscrypt-headerless-dm-crypt-stacks)

           Reference implementation: https://www.笑.wtf/wp-content/uploads/2026/05/abysscrypt-main.zip"

2. SHARE-ALIKE FOR DERIVATIVES

   Any software that incorporates, adapts, ports, or re-implements the
   cipher phrasing technique, whether using this codebase or not, must
   be distributed under this license or a license with attribution and
   commercial-restriction terms at least as protective as those stated
   here.

3. NO MISREPRESENTATION OF INVENTION

   You may not represent the cipher phrasing technique as your own
   invention, claim inventorship of it or any substantially equivalent
   technique, file for any patent, registered design, trade secret
   protection, or other intellectual property right over it, or assist
   any third party in doing so.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
RESTRICTED USES — WRITTEN PERMISSION REQUIRED
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

The following uses are NOT permitted without prior written permission
from hairetikos:

   a) COMMERCIAL USE — incorporation into any software product that is
      sold, licensed for a fee, offered as a paid subscription, or
      bundled as a component of any product generating revenue, in whole
      or in part.

   b) ENTERPRISE USE — deployment within any commercial organisation
      where the Software or the cipher phrasing technique is used to
      protect internal systems, data, infrastructure, or operations as
      part of a business activity, regardless of whether the Software
      itself is sold.

   c) GOVERNMENT AND INSTITUTIONAL USE — use by, or deployment within,
      any governmental body, military organisation, intelligence agency,
      law-enforcement body, regulatory authority, or publicly funded
      institution, at any level (local, national, supranational), in any
      jurisdiction, for any purpose.

   d) HOSTED SERVICES — incorporation into any software-as-a-service,
      platform-as-a-service, cloud-hosted product, or managed service
      offering where the cipher phrasing technique or the Software forms
      part of the service provided to third parties.

To request permission for any restricted use, contact hairetikos via
the repository at https://github.com/hairetikos/abysscrypt.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
PERMITTED WITHOUT RESTRICTION (BEYOND CONDITIONS ABOVE)
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

The following uses are freely permitted subject to the attribution and
share-alike conditions above:

   - Personal use by individuals for their own data protection
   - Non-commercial academic and security research
   - Educational use in courses, tutorials, and training materials
   - Evaluation, testing, and security auditing
   - Non-commercial open-source projects

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
TERMINATION
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Any violation of the attribution requirements, the share-alike
condition, the misrepresentation prohibition, or the restricted-use
terms automatically and immediately terminates all rights granted under
this license without notice. Upon termination you must cease all use and
distribution of the Software and destroy all copies in your possession.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
DISCLAIMER
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES, OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT, OR OTHERWISE, ARISING
FROM, OUT OF, OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
DEALINGS IN THE SOFTWARE.
