.puce format

PUCE Archive

Formato .puce — compressão inteligente e encriptação pós-quântica num único ficheiro.

4.2×
Avg. ratio
48+
Detected types
SHA3-256
Integrity
ML-DSA-65
Signature

Formato .puce

Um novo standard para ficheiros seguros. Combina a melhor compressão possível com proteção quantum-safe.

Seleção ML Automática

Para cada ficheiro, a IA analisa o conteúdo e seleciona automaticamente a melhor estratégia de compressão.

Integridade Verificável

Assinaturas digitais pós-quânticas garantem que o ficheiro não foi alterado e autenticam a origem.

Anatomy of a .puce file

Each file combines header, data blocks, ML manifest and a post-quantum signature in a single container.

Header
0x50554345 · v1

Magic bytes + version

Manifest
JSON-CBOR

ML strategy per block

Blocks
Zstd / LZMA / Neural

Compressed data

Hash chain
SHA3-256

Per-block integrity

Signature
ML-DSA-65

Origin authentication

Lifecycle policies

Auto-move aged files to cheaper tiers while keeping cryptographic integrity intact.

Hot (0–30 days)

Immediate access, stored on SSD. Re-encryption on demand.

Warm (30–180 days)

Standard disk, recovery in seconds. Aggressive LZMA compression.

Cold (180+ days)

Glacier / deep archive. Verifiable integrity without decompressing.

Create and extract a .puce

Live REST API at api.posquantum.com. Each archive is ML-DSA-65 signed and verifiable without extraction.

archive_quickstart.sh
# 1) Criar um arquivo: devolve upload_url pré-assinado
curl -X POST https://api.posquantum.com/v1/motor/archive/create \
  -H "X-API-Key: $PQ_API_KEY" -H "Content-Type: application/json" \
  -d '{"name":"logs_march","retention_months":48,"lifecycle":"hot","compression":"zlib"}'

# => { "archive_id":"...", "upload_url":"https://...r2...",
#      "upload_cloud_path":"...", "status":"pending_upload" }

# 2) Upload direto para R2 (sem passar pela API — zero-trust)
curl -X PUT -H "Content-Type: application/octet-stream" \
  --data-binary @logs_march.tar "$UPLOAD_URL"

# 3) Finalize: chunk + SHA3-256 hash-chain + ML-DSA-65 sign
curl -X POST "https://api.posquantum.com/v1/motor/archive/${ARCHIVE_ID}/finalize" \
  -H "X-API-Key: $PQ_API_KEY" -H "Content-Type: application/json" \
  -d '{"chunk_size_mb":16}'

# => { "status":"completed", "blocks_count":42, "manifest_sha3_256":"...",
#      "signature_ml_dsa_65":"<base64>", "ratio":3.8 }

# 4) Verificar integridade (qualquer momento, até 4 anos)
curl "https://api.posquantum.com/v1/motor/archive/${ARCHIVE_ID}/verify" \
  -H "X-API-Key: $PQ_API_KEY"
# => { "valid":true,
#      "checks":{ "manifest_present":true, "manifest_hash_match":true,
#                 "dsa_signature_valid":true, "hash_chain_valid":true } }

Comparação

Característica.puce.zip.7z
Compressão ML
Encriptação PQC
Assinatura Digital
Compressão Neural
Multi-algoritmo

Why .puce for archival

Auditable

Every file stores the exact algorithm and parameters used.

Own your keys

BYOK with optional HSM. Rotation without re-compressing the archive.

Compliance-ready

FIPS 203/204, ISO 27001, SOC 2 — metadata includes audit trail.

Start archiving with .puce

Integrate via Motor API in minutes. Enterprise support and audit trail included.