Magicall™
Privacy-first video calling: AES-256-GCM end-to-end with verifiable short authentication strings, browser-based with no installs, permanent room URLs, and zero ads or AI training.
magicall.online →Every tool we build started as something we needed for our own audit work — formal verification, post-quantum conformance testing, hybrid KEM implementations, encrypted video calling. All open source, most cited in the literature, all production-deployed somewhere we can name and somewhere we can't.
Verifpal brings symbolic protocol verification to practitioners. Model Diffie–Hellman, signatures, AEAD, post-quantum primitives, and more — under an active attacker, with unbounded sessions and fresh values. Used in production audits and taught in cryptography courses worldwide.
Crucible exercises post-quantum implementations against the bug classes we keep finding in production audits. Each test is tagged with the bug class, the FIPS spec section, and the originating audit finding. Wire any ML-KEM or ML-DSA implementation up over stdin/stdout.
A clean-slate Rust implementation of HPKE (RFC 9180), with first-class support for hybrid post-quantum KEMs via X-Wing (ML-KEM-768 ⊕ X25519). no_std friendly, zero-dep aside from RustCrypto, designed to be both auditable and maximally fast.
A clean reference implementation of ML-KEM (FIPS 203) in pure Go. Suitable for production deployment where post-quantum key encapsulation is needed without pulling in C dependencies.
A 52-page practitioner's guide to post-quantum migration: which primitive to choose, when to hybridize and when to stop, how to migrate TLS without breaking production, what the library landscape looks like today. Companion scorecard and TLS scanner.
Privacy-first video calling: AES-256-GCM end-to-end with verifiable short authentication strings, browser-based with no installs, permanent room URLs, and zero ads or AI training.
magicall.online →A platform for designing Noise Handshake Patterns, browsing pre-computed verification results for every standard pattern, and generating implementations in Go, Rust, and WebAssembly.
noiseexplorer.com →All seven tools live on GitHub. Issues open to the public; PRs reviewed within the week.
github.com/symbolicsoft →Cryptographic protocol questions, bug reports, feature requests — Discord is the fastest path.
discord →Open source tools are a fraction of what we do. Most of our work is design-level audit engagements for organizations that cannot afford to get cryptography wrong.
Secure your architecture →