Expand description
Cipher core for the eT15wiaE px-3 sensor (ADR-0024, N1).
events ── JSON.stringify ── jw(·, IS=50) ── h_p ── v_q(salt, ·, v_n(len, secret)) ── url-encoded payloadRe-exports§
pub use b64::h_p;pub use offsets::v_n;pub use remap::v_m;pub use secret::v_l;pub use sensor::encrypt_sensor;pub use splice::v_q;pub use xor::IS;pub use xor::VJ;pub use xor::jw;
Modules§
- b64
hP / hQ— standard base64 encode over the alphabethIcaptured at line 583 of the eT15wiaE init.js:- offsets
vN(target, lenBound, secret)— offsets PRNG. Seer3-sensor-grammar-2026-05-20.mdfor the un-flattened VM trace.- remap
vM(t, n, e, r, g)— linear remap from[n, e]to[r, g],Math.floor-rounded. JS reference:- secret
vL()— secret-feed builder. JS reference:- sensor
vP— top-level sensor encryptor. Chains the six primitives in the captured init.js (line 6050) into the single output the runtime POSTs to/<tenant>/xhr/b/s:- splice
vQ(salt, payload, offsets)— interleave salt characters into the base64 payload at byte positions produced byvN. Final step of the eT15wiaE sensor encryption stack.- xor
jw(t, n)— single-byte XOR stream cipher used by the eT15wiaE tenant for both the payload stream (keyIS = 50) and the secret feed (keyVJ = 10). Seepx-research/notes/eT15wiaE/r3-….