Post-Quantum Infrastructure

FATED

The company behind PQ PDF and PQ Crypta — building quantum-resistant tools and open-source infrastructure for a post-quantum world.

PQ PDF PQ Crypta GitHub →
0 Forensic Engines
0 PQC Algorithms
0 M+ Threat Indicators
0 PDF Tools

Built for the post-quantum era

Two production tools protecting users from quantum-era threats, today.

PQ PDF

Sovereign PDF Intelligence

46 PDF tools with zero-retention architecture. Process, analyse, and secure PDFs entirely on your infrastructure. Includes the most comprehensive PDF forensics scanner available — 44 independent detection engines.

  • 44-engine PDF forensics scanner
  • IsolationForest + RandomForest + LightGBM with SHAP explainability
  • 6.4M+ offline threat indicators (URLhaus, MalwareBazaar, FeodoTracker)
  • PQC encryption — ML-KEM-1024, ML-DSA-87, SLH-DSA-SHA2-256s
  • Zero retention — files deleted immediately after processing

PQ Crypta

Post-Quantum Cryptography API

Production-grade post-quantum cryptography as a service. NIST-standardised ML-KEM, ML-DSA, and SLH-DSA via REST API, WebAssembly bindings, and Rust crates. Delivered over HTTP/3 + QUIC with quantum-resistant TLS.

  • NIST FIPS 203 / 204 / 205 — ML-KEM, ML-DSA, SLH-DSA
  • HTTP/3 + QUIC transport (X25519MLKEM768 key exchange)
  • Human verification — bot prevention without third-party trackers
  • WebAssembly + Python bindings for cross-platform integration
  • Self-hosted — no vendor access to your cryptographic material

The Arsenal

Production Rust infrastructure powering the post-quantum web. Open source, MIT licensed.

pqcrypta-proxy

v0.2.2 Rust

HTTP/3 + QUIC + WebTransport reverse proxy with hybrid post-quantum TLS. ML-KEM-768 key exchange, automated ACME certificates, adaptive rate limiting, and HMAC-protected circuit breaker. A full nginx replacement for the quantum era.

toml proxy-config.toml
[pqc]
enabled       = true
preferred_kem = "X25519MLKEM768"
min_security  = 3  # NIST Level 3

hmac-circuit-breaker

v0.3.0 Rust

HMAC-SHA256 protected circuit breaker with fail-open semantics. Tamper-evident on-disk state prevents weaponisation as a DoS amplifier. Built for shared and world-writable storage — the only circuit breaker that actively refuses to become a weapon.

toml Cargo.toml
[dependencies]
hmac-circuit-breaker = "0.3"

// Fails open on tamper — never a DoS tool

pqc-binary-format

v1.0.14 Rust

Standardised binary format for post-quantum cryptography data interchange. 47+ algorithms, self-describing metadata for seamless decryption, SHA-256 integrity, and cross-platform bindings for Rust, Python, and WebAssembly.

rust main.rs
use pqc_binary_format::PqcBundle;

let bundle = PqcBundle::encode(
    &ciphertext, algorithm, &meta
)?;

PDF Forensics Scanner

The most comprehensive public PDF forensics tool available. 44 independent engines, ML anomaly classification, and fully offline threat intelligence — no data ever leaves your session.

44 independent detection engines across structural, dynamic, and ML analysis
IsolationForest + RandomForest + LightGBM with SHAP explainability
6.4M+ offline threat indicators — URLhaus, MalwareBazaar, FeodoTracker, OpenPhish
MITRE ATT&CK mapping + strace behavioural sandbox in isolated Linux namespaces
AI forensic narrative via self-hosted Qwen 2.5 — no external API calls
Zero retention — files isolated in mode 0700 directory, deleted immediately
Open Forensics Scanner →
Structure Validator
Byte Signatures
JS AST Deobfuscator
XFA FormCalc
Action Graph
OCG Layer Detect
Unicode Forensics
Trailer Chain
JBIG2 Validator
JS Emulator
Font CharString
XRef Integrity
ML Anomaly
Threat Intel
Polyglot Detect
ClamAV Engine
YARA Rules
Sandbox strace
Phishing Detect
Signature Forensics
SHAP Explainer
AI Report
TLSH Fuzzy Hash
AcroForm Fields

Fated LLC

Fated LLC is a security-focused software company building post-quantum cryptography infrastructure for the open web. We develop and maintain PQ PDF, PQ Crypta, and a suite of open-source Rust libraries that power quantum-resistant communication.

Our tools are designed on a simple principle: security should be sovereign. No telemetry, no data retention, no vendor lock-in. Everything runs on your infrastructure, under your control.

Zero Retention

Files and sensitive data deleted immediately after processing. No logs of your content, ever.

Quantum-Resistant

NIST FIPS 203 / 204 / 205 algorithms. Built to withstand cryptographically relevant quantum computers.

Open Source

Core infrastructure is public, auditable, and MIT licensed. Security through transparency.

Sovereign

Enterprise deployments run entirely on-premises. No external dependencies, no vendor access.