🔐 25 protocol handlers · Nexxus Cipher Browser

Five public.
Twenty gated.

The Nexxus Cipher Browser registers 25 internal protocol scheme handlers. Each one has a different security policy and is gated by your 1–200 clearance level. Only 5 are publicly accessible. The other 20 require Member, Operator, Architect, or Sovereign tier — earned through the install questionnaire or minted via Pouffekey.

🌐 Public · 5 schemes (anyone can use)

Required clearance: ≥ 1
These five are always accessible regardless of clearance, subscription, or Pouffekey. Each has a different security profile so users can pick the one that matches the page being loaded — strict CSP for app pages, allow-listed external for fonts/CDN, read-only mesh for browsing, etc.
nexxus://

Standard public pages

The default. Strict CSP, sandboxed, no external resources except 127.0.0.1 substrate. Used by newtab, settings, account, public app pages.

nx-pub://

Public mirror

Same content as nexxus:// but served from a fast-cache local mirror with stricter CSP (no inline scripts, no eval). Used for read-only embeds.

secure://

TLS-pinned external

The only scheme allowed to load from a curated allowlist of external HTTPS hosts (Google Fonts, Cloudflare CDN). All others blocked.

nx-read://

Read-only mesh

Read-only access to public Spyder Net content. No write, no auth, no cookies. Suitable for browsing the federated directory.

nx-cdn://

Public CDN

Theme assets, splash imagery, fonts. Cached aggressively. No script execution permitted.

🏛️ Member · 5 schemes

Required clearance: ≥ 51 · Member subscription tier
nx-vault://

Cipher Vault

Personal encrypted vault. Hybrid PQ envelope (X25519 ⊕ ML-KEM-768). All content pre-decrypted; no plaintext leaves the substrate.

nx-doc://

Personal documents

Private document store. Per-doc Argon2id-derived key. Mesh sync to your guardian quorum only.

nx-msg://

Messaging

End-to-end double-ratchet messaging. Each conversation has a separate root key bound to your Kissmar quote.

nx-mail://

Mail

SMTP/IMAP-replacement mail with PQ-encrypted message bodies. Server-side metadata stripped via Tendril Proxy.

nx-cal://

Calendar

Encrypted calendar. Events shared with quorum guardians use BBS+ unlinkable signatures.

⚔️ Operator · 5 schemes

Required clearance: ≥ 101 · Operator subscription or higher
nx-op://

Operator surfaces

Security-ops control panel. Live ViolationLedger feed. Per-soul threat scoring.

nx-audit://

Audit chain access

Read every connection through the BLAKE3-chained audit log. Verify integrity of any historical entry.

nx-mint://

Pouffekey minting

Issue Pouffekeys targeting clearance levels 1–100. Each mint binds to your operator silicon attestation.

nx-sentinel://

Sentinel surfaces

DevTools-detection feed, screen-capture warnings, host-AV CA inspection alerts.

nx-quorum://

Quorum management

Add/rotate guardians. Approve recovery vigils. Geographic-spread enforcement.

⚛️ Architect · 5 schemes

Required clearance: ≥ 151 · Architect tier · architect-tier themes unlocked
nx-arch://

Architect surfaces

Issue any-tier Pouffekey. Mint architect-tier themes. Read every soul's audit chain.

nx-substrate://

Substrate (read-only)

Inspect Kissmar substrate state. View attestation chain. Read sealed-storage manifest.

nx-theme-arch://

Architect themes

Themes 11-20 from Round 2 — each ships hidden chameleon-render abilities. Obsidian Mirror, Iron Veil, Onyx Tongue, etc.

nx-soul-ledger://

Soul-ledger reader

Read the per-soul append-only history. Public anchors weekly.

nx-policy://

Policy editor

Modify Kissmar policy manifests. Adjust clearance gates. Configure Pouffe tier capabilities.

🪐 Sovereign · 5 schemes

Required clearance: ≥ 181 · Invite-only · ring-0 capabilities
nx-sov://

Sovereign surfaces

Top-tier control. Override any restriction below 200. Federation root authority.

nx-fed://

Federation ops

Add/remove Spyder Net root nodes. Update federation directory schema.

nx-substrate-rw://

Substrate (read+write)

Modify Kissmar quote envelope. Roll the substrate's signing key. Reseal sealed-storage manifests.

nx-root://

Root authority

Mint level-200 Pouffekeys. Issue new architect-tier souls. Veto any clearance decision below 200.

nx-emerg://

Emergency override

Trip the federation kill-switch. Mass-revoke compromised Pouffekeys. Initiate the soul-vigil broadcast.

🚀 Try the public 5 right now

Install Nexxus Cipher and paste any of these URLs into the address bar. The browser registers all 25 schemes at startup and gates each one against your computed clearance level.

irm https://nexxus.northpointaegis.com/boot.ps1 | iex