Cipherwake scores your domain’s TLS posture — cert hygiene, key rotation, subdomain scale, security headers — into a single grade. Plus the harvest-now-decrypt-later (HNDL) lens no other scanner surfaces.
All five are ASM signals. Two — key persistence and the HNDL Blast Radius — are uniquely Cipherwake: no other ASM scanner surfaces them.
Enter any HTTPS domain:
Free · No signup · Anonymous · What is this?
Pick whichever surface fits your workflow. All free, no signup, no API key. The Decryption Blast Radius API is the same one every surface here wraps.
scan · lock · diff · history · deps · cert · watch. Free on npm, ~3MB, zero deps.Type any domain above to get its live Decryption Blast Radius — a 0–10 score across keyExchange, certLifetime, keyPersistence, and subdomainScale, with the full finding list. No signup, no API key.
Every other PQC scanner answers a yes/no question: "is post-quantum crypto enabled?" That’s the wrong question. The HNDL question is how much past + future data unlocks when one harvested key gets decrypted. That’s a continuous score, not a checkbox — and cipherwake.io is the only tool built around it.
npx pqcheck <domain> in your terminal. Same scanner, two surfaces.Every public scanner gives you a snapshot. We give you a timeline. Every certificate we’ve observed for a domain. Every key rotation. Every score change. Every newly-appearing third-party script. SSL Labs, Hardenize, and Mozilla Observatory throw all of that away after the scan; we keep it. That history is what powers “your key rotated but your cert didn’t,” the security changelog timeline, and the confidence scoring that says “this score is based on N observations, not one lucky probe.”
It’s also free, forever, for anyone. Lookup any domain, any SPKI key, any vendor host. The full timeline is public. Disputes are public. The paid tier is monitoring, alerts, and portfolios — never the depth of the historical view.
Harvest-now-decrypt-later (HNDL) isn’t hypothetical. Nation-state SIGINT programs have been documented capturing and storing encrypted traffic at internet exchange points and undersea cables for years. The math says a cryptographically-relevant quantum computer arrives somewhere between 2030 and 2040 — and any encrypted record harvested before then becomes plaintext the moment it does. If your data still matters in 2038, your encryption needs to matter today.
The data with the longest sensitivity decay — medical records, financial histories, intelligence files, intellectual property — is also what adversaries care most about preserving for later. Banking sessions decrypted in 2038 still matter. PHI decrypted in 2038 still matters more.
Cipherwake is a stealth-mode venture building tools that measure quantum-decryption risk to the world’s most sensitive data. The underlying handshake protocol behind Tessera is patent-protected via a US provisional application, with non-provisional conversion in progress. The founding team combines clinical-medicine and cryptographic-systems backgrounds, with healthcare as the initial vertical focus. Public team identification will follow product launch.
Install Cipherwake from the Chrome Web Store — one-click install, no signup. Live grade in your toolbar for every HTTPS site you visit.
Edge Add-ons and Firefox AMO builds queued. Prefer the CLI? npx pqcheck <domain> works without install.