Skip to content
Altug Tatlisu edited this page Oct 25, 2025 · 1 revision

Welcome to the Hermes Wiki! 🔐

Hermes is a military-grade secure file transfer system built with Rust, featuring hybrid RSA+AES encryption, self-destruct timers, and multi-recipient support.

🚀 Quick Navigation

Getting Started

Core Features

Technical Documentation

Advanced Topics

Resources

  • Roadmap - Future features and development plans
  • Changelog - Version history
  • FAQ - Frequently asked questions

📊 Project Status

Current Version: v1.0.0
Status: ✅ Production Ready
Last Updated: January 25, 2025

Feature Completion

Feature Status Version
Password-based encryption ✅ Complete v0.1.0
SFTP integration ✅ Complete v0.1.0
Custom binary protocol ✅ Complete v1.0.0
Self-destruct timer ✅ Complete v1.0.0
Multi-recipient RSA+AES ✅ Complete v1.0.0
GZIP compression ✅ Complete v1.0.0
SHA-256 integrity ✅ Complete v1.0.0
Backward compatibility ✅ Complete v1.0.0
Steganography 🔜 Planned v2.0.0
Quantum-resistant 🔜 Planned v2.0.0

🎯 Use Cases

1. Secure Team Communication

Share sensitive documents and messages with team members using multi-recipient encryption.

2. Temporary File Sharing

Send files with automatic expiration using self-destruct timers.

3. Confidential Business Documents

Protect trade secrets and confidential information with military-grade encryption.

4. Developer Secrets Management

Share API keys, certificates, and credentials securely.


🔐 Security Highlights

  • AES-256-GCM: Military-grade symmetric encryption
  • RSA-4096: Strong asymmetric encryption
  • Argon2: Memory-hard key derivation
  • SHA-256: Cryptographic integrity verification
  • Zero-knowledge: Server never sees plaintext

📚 Learning Path

For Beginners

  1. Read Installation Guide
  2. Follow Quick Start Tutorial
  3. Try Password-Based Encryption
  4. Explore Configuration Guide

For Advanced Users

  1. Set up Multi-Recipient Encryption
  2. Understand Security Architecture
  3. Study Binary Protocol
  4. Review Best Practices

For Developers

  1. Read Development Guide
  2. Review API Reference
  3. Check Roadmap
  4. Contribute via Pull Requests

🤝 Community

  • GitHub Issues: Report bugs and request features
  • Discussions: Ask questions and share ideas
  • Pull Requests: Contribute code and documentation

📧 Contact

  • Author: Altug Tatlisu
  • Email: contact@chronocoder.dev
  • GitHub: @ChronoCoders

⚡ Built with Rust 🦀 | Secured by Mathematics 🔢 | Protected by Design 🛡️

# Welcome to the Hermes Wiki! 🔐

Hermes is a military-grade secure file transfer system built with Rust, featuring hybrid RSA+AES encryption, self-destruct timers, and multi-recipient support.

🚀 Quick Navigation

Getting Started

Core Features

Technical Documentation

Advanced Topics

Resources

  • [Roadmap](Roadmap) - Future features and development plans
  • [Changelog](Changelog) - Version history
  • [FAQ](FAQ) - Frequently asked questions

📊 Project Status

Current Version: v1.0.0
Status: ✅ Production Ready
Last Updated: January 25, 2025

Feature Completion

Feature Status Version
Password-based encryption ✅ Complete v0.1.0
SFTP integration ✅ Complete v0.1.0
Custom binary protocol ✅ Complete v1.0.0
Self-destruct timer ✅ Complete v1.0.0
Multi-recipient RSA+AES ✅ Complete v1.0.0
GZIP compression ✅ Complete v1.0.0
SHA-256 integrity ✅ Complete v1.0.0
Backward compatibility ✅ Complete v1.0.0
Steganography 🔜 Planned v2.0.0
Quantum-resistant 🔜 Planned v2.0.0

🎯 Use Cases

1. Secure Team Communication

Share sensitive documents and messages with team members using multi-recipient encryption.

2. Temporary File Sharing

Send files with automatic expiration using self-destruct timers.

3. Confidential Business Documents

Protect trade secrets and confidential information with military-grade encryption.

4. Developer Secrets Management

Share API keys, certificates, and credentials securely.


🔐 Security Highlights

  • AES-256-GCM: Military-grade symmetric encryption
  • RSA-4096: Strong asymmetric encryption
  • Argon2: Memory-hard key derivation
  • SHA-256: Cryptographic integrity verification
  • Zero-knowledge: Server never sees plaintext

📚 Learning Path

For Beginners

  1. Read [Installation Guide](Installation)
  2. Follow [Quick Start Tutorial](Quick-Start)
  3. Try [Password-Based Encryption](Password-Encryption)
  4. Explore [Configuration Guide](Configuration)

For Advanced Users

  1. Set up [Multi-Recipient Encryption](Multi-Recipient)
  2. Understand [Security Architecture](Security-Architecture)
  3. Study [Binary Protocol](Binary-Protocol)
  4. Review [Best Practices](Best-Practices)

For Developers

  1. Read [Development Guide](Development)
  2. Review [API Reference](API-Reference)
  3. Check [Roadmap](Roadmap)
  4. Contribute via Pull Requests

🤝 Community

  • GitHub Issues: Report bugs and request features
  • Discussions: Ask questions and share ideas
  • Pull Requests: Contribute code and documentation

📧 Contact


⚡ Built with Rust 🦀 | Secured by Mathematics 🔢 | Protected by Design 🛡️