Expand description
Domain layer — pure business logic, no I/O.
Sub-modules are bounded contexts. All share the canonical type
vocabulary defined in types.
Modules§
- adaptive
- Adversarial embedding optimisation, camera model profile matching, compression-survivable embedding.
- analysis
- Capacity estimation and chi-square detectability analysis.
- archive
- ZIP / TAR / TAR.GZ archive handling.
- canary
- Canary shard tripwires for distribution compromise detection.
- corpus
- Corpus steganography: zero-modification cover selection via ANN search.
- correction
- Reed-Solomon K-of-N erasure coding with HMAC integrity.
- crypto
- ML-KEM-1024, ML-DSA-87, Argon2id, AES-256-GCM, and secure zeroing.
- deadrop
- Dead drop mode: platform-aware cover generation for public posting.
- deniable
- Dual-payload deniable steganography and panic wipe.
- distribution
- Four distribution patterns: 1:1, 1:N, N:1, N:M.
- errors
- Domain error types for all bounded contexts.
- media
- Image (PNG/BMP/JPEG/GIF) and audio (WAV) codec adapters.
- opsec
- Amnesiac mode, geographic distribution manifests, forensic watermark tripwires.
- PDF first-class bounded context: embed/extract, page-render pipeline, stego techniques.
- ports
- Port trait definitions for all bounded contexts.
- reconstruction
- K-of-N shard reassembly with manifest verification.
- scrubber
- Linguistic stylometric fingerprint scrubbing.
- stego
- Steganography techniques: LSB image, DCT JPEG, palette, audio, zero-width text.
- timelock
- Time-lock puzzle payloads using Rivest iterated squaring.
- types
- Canonical type vocabulary shared across all bounded contexts.