Fractal-Geometric Storage Protocol

Store nothing.
Prove nothing.

A cloud storage protocol where the server is mathematically blind — and without two keys only you hold, there is no way to prove anything is even there.

Scroll

Encrypted storage has one weakness: the data is still provably there. You can be compelled. The device can be seized. Someone always has leverage — because the existence of the data is never in question.

FGSP hides your data inside an encrypted noise field. Every block on the drive looks identical — uniform, high-entropy, indistinguishable from random data. Your actual files are placed inside that noise using fractal mathematics as the guidance system. Two keys control everything.

Barrier One
The Coordinate
A point in an effectively infinite 3D space. Without the exact coordinate, there is no starting point and no path through the data.
Barrier Two
The Shape Key
Controls the fractal geometry itself — effectively infinite configurations. Changes everything about how and where your data is placed.
Result
Nothing Provably There
The server stays blind. All math runs client-side. Even full drive seizure produces only noise. There is nothing to decrypt because there is nothing provably there.
Journalists & Whistleblowers
Upload sensitive material in the field and walk away clean. Nothing on the device. Nothing provable. No liability.
Field Operators
Store operationally sensitive data with cloud access from anywhere. The server never knows what it's holding.
Lawyers & Advocates
Client confidentiality at the storage layer. Compelled disclosure can't produce what isn't provably there.
Sovereignty-Minded Individuals
Anyone who needs their data to not provably exist. A seizure produces noise. Full stop.
The operator cannot identify your data. No Shape Keys, no Coords, no mapping between you and your bulb exists on the server. There is nothing to subpoena that would be useful.
Drive seizure yields only noise. Every block on the drive is indistinguishable from random data. Without your two keys, there is no forensic starting point.
All cryptographic math runs on your device. The server sees only ciphertext and opaque authenticators. It cannot compute what it never receives.
Cloud-based, Tor-routed, no public IP. Accessible from anywhere in the world. No account. No identity. Just the two keys you hold.
Deadman release on your terms. Per-file check-in timers. If you go dark, an encrypted packet releases to a designated recipient. The release proves nothing without your Shape Key.
What we don't protect against: endpoint compromise (if your device is infected, the attacker reads plaintext directly), coercion of you personally, or losing both keys with no Drive A — access is gone by design. That's not a bug. It's the architecture.

Be first in.
No account required.

FGSP is in early build. Founding users get priority provisioning, reduced rates, and direct input on the product. Leave your email — we'll reach out when it's ready.

No account is created. No identity is stored. We only use this email to reach out about access. You can opt out at any time.

Request received. We'll be in touch when early access opens.

In the meantime — don't lose your keys.