Free public tool No signup No API key Open methodology Real handshake probe

Encrypted today.
Plaintext in 2035.

Cipherwake scores your domain’s TLS posture — cert hygiene, key rotation, subdomain scale, security headers — into a single grade. Plus the harvest-now-decrypt-later (HNDL) lens no other scanner surfaces.

What goes into your score
📜
Cert hygieneexpiry margin, issuer chain, wildcard discipline. The same signals every cert-monitoring tool watches, just rolled into the grade.
🔑
Key persistence (uniquely Cipherwake)your cert rotated, but did the private key actually change? We mine Certificate Transparency logs to find out. The Heartbleed / SolarWinds lesson — no other scanner surfaces this.
🌐
Subdomain scale + takeover riskhow many subdomains share this key, dangling wildcards, orphaned CNAMEs. Standard ASM signal.
🛡️
Security headers + email postureHSTS, CSP, X-Frame-Options, Referrer-Policy, SPF/DMARC/DKIM. Standard hardening signals.
🔐
Decryption Blast Radius (uniquely Cipherwake)how much past + future traffic decrypts if one private key is harvested today and broken by a quantum computer in 2030+. The HNDL lens no other scanner ships.

All five are ASM signals. Two — key persistence and the HNDL Blast Radius — are uniquely Cipherwake: no other ASM scanner surfaces them.

Enter any HTTPS domain:

Free · No signup · Anonymous · What is this?

Try:
Monitor this domain daily — signed badge, 90-day history, email alerts. Starter $29/mo · 5 domains · cancel anytime
Use Cipherwake anywhere

Same scanner. Web, terminal, CI, browser.

Pick whichever surface fits your workflow. All free, no signup, no API key. The Decryption Blast Radius API is the same one every surface here wraps.

Your report

Decryption Blast Radius

Type any domain above to get its live Decryption Blast Radius — a 0–10 score across keyExchange, certLifetime, keyPersistence, and subdomainScale, with the full finding list. No signup, no API key.

Example preview · live scan when you submit a domain
example-bank.com (sample)
─────────────────────────────────────
DECRYPTION BLAST RADIUS: 5.4 / 10 (MEDIUM)
Public-surface TLS handshake observation:
  • • TLS: TLSv1.3 (TLS_AES_128_GCM_SHA256)
  • • Hybrid PQC: no
  • • Cert expires in: 287 days
  • • HSTS: enabled
  • • Subdomains: 47 (wildcard cert — single key compromise multiplies)

Score breakdown — what drives the number:
Key exchange
weight 50%
3.0
Cert lifetime
weight 10%
0.6
Key persistence
weight 20%
1.4
Subdomain scale
weight 20%
0.4
Components contribute to the final 0–10 score by their weights. Multi-factor by design — CT-log key reuse is one signal among several.

Sample findings (3 of 11 in a live scan):
  • • RSA fallback handshake observed — recorded TLS sessions decryptable post-CRQC
  • ★ Same public key reused across 4 consecutive cert rotations (CT-log verified, 3.2y window)
  • • Wildcard SAN spans 47 subdomains — single key compromise multiplies blast radius
↑ Drop any domain in the box above and press Check exposure for a live report on your own infrastructure.
How it works

Drop in a domain. Get a score. In seconds.

Every other PQC scanner answers a yes/no question: "is post-quantum crypto enabled?" That’s the wrong question. The HNDL question is how much past + future data unlocks when one harvested key gets decrypted. That’s a continuous score, not a checkbox — and cipherwake.io is the only tool built around it.

01
Type a domain

Anonymous, no signup, in your browser or terminal.

cipherwake.io
Drop any HTTPS domain into the box, or run npx pqcheck <domain> in your terminal. Same scanner, two surfaces.
02
Get the score

One number that says how much past data unlocks.

Decryption Blast Radius · 0–10
Composite of TLS version, cert lifetime, key-reuse history, and wildcard subdomain count. A continuous score, not a yes/no checkbox — and the only one built specifically around HNDL.
03
See what's hidden

Public surface is one side. Internal is 12–40× bigger.

12–40× internal multiplier
The public-facing score is what we can see from outside. Internal connections — databases, microservices, VPN, backups — typically multiply your blast radius 12–40×. We label what we can't measure.
Open methodology

Every score component, every weight, every threshold — public.

Decryption Blast Radius is a continuous score across four weighted components: keyExchange (50%), certLifetime (10%), keyPersistence (20%), and subdomainScale (20%). The full math, the threshold tables, the “what we DON’T claim” sections, and the changelog from v1.0 → v1.1 are documented per-tool. We compete with opaque vendor-risk vendors specifically because we’re not opaque.

Browse methodology library → 195 tests verify the formula →

The historical-data moat

We don’t just scan. We remember.

Every public scanner gives you a snapshot. We give you a timeline. Every certificate we’ve observed for a domain. Every key rotation. Every score change. Every newly-appearing third-party script. SSL Labs, Hardenize, and Mozilla Observatory throw all of that away after the scan; we keep it. That history is what powers “your key rotated but your cert didn’t,” the security changelog timeline, and the confidence scoring that says “this score is based on N observations, not one lucky probe.”

It’s also free, forever, for anyone. Lookup any domain, any SPKI key, any vendor host. The full timeline is public. Disputes are public. The paid tier is monitoring, alerts, and portfolios — never the depth of the historical view.

Live pulse feed → What’s free vs. paid →
Sector leaderboards + watchlists

Curated peer scans. Ranked by Decryption Blast Radius.

We run nightly scans across ~250 curated peer domains: major banks, hospitals, SaaS, federal agencies, telecoms, airlines. Public leaderboards by sector show who’s most exposed. Public watchlists slice the data thematically: longest cert lifetimes, most-reused keys, biggest wildcard surfaces.

Sector leaderboards → Thematic watchlists →
Why this matters now

Adversaries are already harvesting. Decryption arrives later.

Harvest-now-decrypt-later (HNDL) isn’t hypothetical. Nation-state SIGINT programs have been documented capturing and storing encrypted traffic at internet exchange points and undersea cables for years. The math says a cryptographically-relevant quantum computer arrives somewhere between 2030 and 2040 — and any encrypted record harvested before then becomes plaintext the moment it does. If your data still matters in 2038, your encryption needs to matter today.

The data with the longest sensitivity decay — medical records, financial histories, intelligence files, intellectual property — is also what adversaries care most about preserving for later. Banking sessions decrypted in 2038 still matter. PHI decrypted in 2038 still matters more.

About Cipherwake

Patent-protected. Stealth mode.

Cipherwake is a stealth-mode venture building tools that measure quantum-decryption risk to the world’s most sensitive data. The underlying handshake protocol behind Tessera is patent-protected via a US provisional application, with non-provisional conversion in progress. The founding team combines clinical-medicine and cryptographic-systems backgrounds, with healthcare as the initial vertical focus. Public team identification will follow product launch.