Skip to main content

Module cipher

Module cipher 

Source
Expand description

Cipher core for the eT15wiaE px-3 sensor (ADR-0024, N1).

events ── JSON.stringify ── jw(·, IS=50) ── h_p ── v_q(salt, ·, v_n(len, secret)) ── url-encoded payload

Re-exports§

pub use b64::h_p;
pub use offsets::v_n;
pub use remap::v_m;
pub use secret::v_l;
pub use sensor::encrypt_sensor;
pub use splice::v_q;
pub use xor::IS;
pub use xor::VJ;
pub use xor::jw;

Modules§

b64
hP / hQ — standard base64 encode over the alphabet hI captured at line 583 of the eT15wiaE init.js:
offsets
vN(target, lenBound, secret) — offsets PRNG. See r3-sensor-grammar-2026-05-20.md for the un-flattened VM trace.
remap
vM(t, n, e, r, g) — linear remap from [n, e] to [r, g], Math.floor-rounded. JS reference:
secret
vL() — secret-feed builder. JS reference:
sensor
vP — top-level sensor encryptor. Chains the six primitives in the captured init.js (line 6050) into the single output the runtime POSTs to /<tenant>/xhr/b/s:
splice
vQ(salt, payload, offsets) — interleave salt characters into the base64 payload at byte positions produced by vN. Final step of the eT15wiaE sensor encryption stack.
xor
jw(t, n) — single-byte XOR stream cipher used by the eT15wiaE tenant for both the payload stream (key IS = 50) and the secret feed (key VJ = 10). See px-research/notes/eT15wiaE/r3-….