🚀 Support ZOSCII

This software is free and open-source (MIT license). Help prove ZOSCII works by using it.

ZOSCII development is supported entirely by ZOSCIICOIN.

Learn more about ZOSCIICOIN

🎺 ZOSCII TrumpetBlower

Because trumpets are louder than whistles.

Post-quantum secure. Zero trust required. Verify the code yourself.

🎯 How It Works

⚠️ IMPORTANT: There is NO hosted encoding client for ZOSCII TrumpetBlower.

You MUST download the client from GitHub and run it locally to ensure your ROM is never uploaded to any server.

Step-by-Step:
  1. Download the client from GitHub
    Visit: https://github.com/PrimalNinja/cyborgzoscii
    Download the 'trumpetblower.html' client to your computer
  2. Verify the client is NOT minified
    Open the HTML file in a text editor. The code should be readable with proper spacing and comments.
    If it looks like compressed gibberish on one line, DO NOT USE IT.
    Readable code = trustworthy. Minified code = potential compromise.
  3. Establish Anonymity (Use Tor) 🌐
                        Your anonymity is your first line of defense.
                        What Tor Does: Tor routes your connection through multiple relays, making it virtually impossible for the host or any observer to determine your true IP address or geographic location.
                       
                        Option A (Recommended): Tor Browser
                        1. Go to the official Tor Project website: https://www.torproject.org/download/
                        2. Download, install, and launch the Tor Browser.
                        3. You must use this browser for all subsequent steps involving the server.
                       
                        Option B (Highest Security): Tails OS
                        1. Follow the installation guide: https://tails.net/install/
                        2. Run the local 'trumpetblower.html' file within the Tails environment and Tor Browser.
  4. Run the client locally
    Open the HTML file in your browser from your local filesystem
    Do NOT use any hosted version - only trust what you've verified yourself
  5. Configure the Server
    Enter the ZOSCII TrumpetBlower Server URL you wish to use, See available servers below
    Enter a channel number (an integer), something not identifiable to you, it doesn't matter if it is used already or not, it's just easier to find unknown data by a reference in future
    Enter a number of desired retention weeks (an integer)
  6. Encode your documents
    💡 Recommended: ZIP your files before encoding. This reduces our storage overhead and preserves file metadata like date/time stamps that can serve as evidence of when documents existed.

    Use any file as your ROM (photo, document, etc.)
    There should be no red lines in the verification character usage
    The ROM becomes your encoding key - NEVER upload it anywhere
    The client will create an address file (just pointers, no actual data)
  7. Keep your ROM safe
    Store your ROM securely - you'll need it to decode later
    Losing your ROM = losing your data forever
    Your ROM is your key to release the information when you're ready
  8. Submit to Server
    Only the address file is uploaded with the channel and retention, the address file contains none of the original data - just pointers
    We (and everyone else) can't decode it without your ROM
    When you're ready to blow the trumpet, release your ROM publicly
  9. Redundancy
    All address files are made available for download, replication and of course for when you wish to make a noise

⚖️ Australian Legal Notice

This service operates under Australian law and is subject to the Assistance and Access Act 2018.

Under this legislation, we may be compelled to:

  • Assist with lawful access to communications
  • Implement technical capability measures

This is exactly why we recommend downloading and verifying the client yourself. If we were ever compelled to modify our code, you would be able to detect it by comparing against the GitHub source or noticing minification. By running your own verified local copy, you eliminate this risk entirely.

For maximum security: Only use the local client version downloaded from the official GitHub repository.

🔒 For Whistleblowers

Your Truth. Your Timing. Your Protection.

We literally cannot know what you've uploaded. No encryption to break. No data to compel. Just addresses pointing to... something.

Legal protection: Many jurisdictions protect whistleblowers. ZOSCII TrumpetBlower adds technical protection beyond legal - even corrupt governments can't access what we don't have.

⚠️ Critical: Use the official GitHub client.
→ Verify it's NOT minified
→ Confirm it does NOT upload your ROM
→ Don't trust, verify

⚠️ Don't lose your ROM - unless you want your secrets to stay secret forever.

📅 File Retention Policy

Upon submission, you'll specify a rough timeframe for how long you'd like us to keep your address file as a minimum. We ask this because we'll try our best to honor it, but due to server costs we may need to remove files on occasion.

Since we have no way of knowing what's in each encoded file, the only thing we can ask is: How many weeks do you want us to keep the file for as a minimum?

We know the time you upload it and will consider the weeks beyond that. We'll try our best to accommodate your timeline.

💡 Tip: For maximum resilience, consider uploading your address file to multiple ZOSCII TrumpetBlower instances or mirrors. Since the file is just pointers, spreading it across multiple hosts ensures it stays available even if one site goes down.

📢 For Journalists & Advocates

The Trumpet Sounds for Everyone

Once a whistleblower releases their ROM:

All encoded files are public. You're encouraged to:
  • Mirror this entire site
  • Download all address files
  • Host your own ZOSCII TrumpetBlower instance
  • Distributed infrastructure = censorship resistance

🏛️ For Governments

Welcome! We're So Glad You're Here.

You're probably here for one of two reasons:

1. You're considering whistleblowing - Welcome! See above.

2. You don't like whistleblowers - Probably because you're up to no good.

Here's the thing: We have NO IDEA what's in these address files. Could be:

  • 🍪 Grandma's cookie recipes
  • 🛸 Proof of alien contact
  • 💣 Your corruption evidence
  • 📋 Shopping lists

You're welcome to:

Fun fact: Compelling us to decrypt is like demanding we unscramble an egg. There's nothing TO decrypt.

🔍 Technical Transparency

Open Source. Open Access. Open Truth.

This is as transparent as technology gets. We deliberately do NOT provide a hosted encoding tool because that would require you to trust us. Instead, we give you the source code and tell you: verify it yourself.

📡 Known ZOSCII TrumpetBlower Servers

Secure Communication Endpoints

Publicly available endpoint for secure communication. Download the client from GitHub to connect securely.

⚖️ Disclaimers

  • We host pointers, not data. You're responsible for what you encode.
  • No guarantees. Use at your own risk.
  • No legal advice. Consult a lawyer about your specific situation.
  • Dual use: This tool can reveal corruption OR grandma's recipes. Choose wisely.
  • Not financial advice. We are not advocating you invest in ZOSCIICOIN or any other cryptocurrencies. Consult your financial advisor.

❓ FAQ

Q: What happens if you get a warrant?

A: We'll hand over... meaningless address files you can already download yourself.

Q: Can quantum computers break this?

A: No. There's no computational puzzle to solve.

Q: What if I lose my ROM?

A: Your data is lost forever. We can't help you. Nobody can.

Q: Is this legal?

A: Hosting address files? Yes. What YOU do with them? Consult a lawyer.

Q: Can you take down a file?

A: We can, but it's already public and mirrored everywhere. Good luck putting that genie back.