You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A wrapper around the dotnet-tool install path is the minimum-viable form.
Debian / Ubuntu .deb
Wanted
Distro packaging; requires a stable v1 first.
Arch PKGBUILD
Wanted
AUR submission once v1 is cut.
Windows winget
Wanted
Same v1 dependency.
Existing tools and pipelines
Pipeline
State
Notes
`tar
pqf encrypt` (single-file archive of a tree)
Shipped
pqf encrypt as a backup-tool target (restic, borg, rclone)
Wanted
These all support pluggable encryption hooks; PQF could slot in as one.
Mail attachments (Thunderbird MIME)
Wanted
A small extension could register .pqf as an attachment type and call into a Rust/Python reader.
Object storage server-side scan (S3 / GCS / B2)
Wanted
A small Lambda / Function that calls pqf inspect on uploaded blobs.
Sigstore Cosign / in-toto attestation
Wanted
The PQF file_id is a natural subject; an attestation pointing to a signed PQF could chain to a transparency log.
Explicitly out of scope
Item
Why
Transport (TLS, Noise, QUIC)
PQF is a file-at-rest format. Transport security lives elsewhere.
Real-time messaging
Same.
Disk / volume encryption
Same: at-rest disk encryption is a different threat model.
Anonymity / metadata privacy
The header is plaintext by design. Don't model PQF as solving this; layer a metadata-privacy system above.
Streaming network protocol (chunks released over a socket)
Streaming Mode releases verified chunks to a Stream, but the protocol surface stops at "Stream." Network framing is a caller concern.
How to propose an integration
Open a discussion
describing what you want to interop with and roughly how. The bar for
moving a row to In progress is "there is a real PR or external repo
making the attempt."