Back to SETEC LABS
I Do Not Exist (And Neither Does This Server)
By: Ph4ntom

DOCUMENT REF: [REDACTED]-[REDACTED]-[REDACTED]
DISTRIBUTION: NONE
CLASSIFICATION: [REDACTED]
AUTHOR: [REDACTED]
DATE: [REDACTED]
PURPOSE: RECORD OF EVENTS THAT DID NOT OCCUR

Stop. Read that header again.
Events that did not occur.
Proceed accordingly.

The contact came through SsSnake. Channel: [REDACTED]. Timing: [REDACTED] months ago, relative to whenever you are reading this, which should be never, because this document does not exist.

A journalist. Unnamed here. Unnamed everywhere. Documents in hand. The kind of documents that don't stay secret because powerful people want them secret. The kind of secrets that travel in one direction only: toward the light, eventually, whether anyone intends them to or not.

The problem. State-level adversary. Well-resourced. Patient. Their surveillance coverage of the journalist's communications was, by any reasonable assessment, total. Email: monitored. Phone: monitored. Commercial messaging applications, encrypted or not: monitored, or compromised, or both. The adversary had either the keys or the court orders or the arrangements that don't require either. The specific mechanism was irrelevant. The effect was the same. The journalist had documents. The journalist had nowhere safe to send them.

SsSnake's request, distilled: build a dead drop. One-time use. No logs. No artifacts. No surface to grip.

// INFRASTRUCTURE

Commercial cloud: eliminated. Every major provider maintains logs. Some honor subpoenas. Some honor requests that don't require subpoenas. The arrangements exist. They are not acknowledged in annual transparency reports, because that would defeat the whole damn point. They are known by people who need to know them.

Tor hidden services: eliminated. The adversary had demonstrated documented, targeted deanonymization capability within the operational jurisdiction. Not theoretical. Documented.

Purpose-built hardware. Purchased with cash. New vendor. Single visit. The hardware: a single-board computer. [MAKE AND MODEL REDACTED]. Loaded with a custom OS. No package manager. No repositories. No attack surface beyond operational minimum. The web server: written from scratch. C. Eight hundred and twelve lines. Audited three times before deployment. No external libraries. Nothing borrowed. Nothing trusted.

Encrypted filesystem: LUKS. Keyfile stored on volatile RAM only. Power loss destroys it. No persistence. No recovery.

Tripwires: twelve. Failed authentication. Network anomaly detection. USB state change. Physical orientation sensor. Variance from expected traffic timing signature. Dead man's switch: keepalive required every four hours on a rotating one-time-pad schedule. First missed window triggers a disk overwrite. Seven passes. PRNG-sourced random data. Nothing survives it. Nothing is meant to.

// ROUTING

gh0stwire built the path. [REDACTED] intermediate nodes. [REDACTED] jurisdictions. Among them: two nations with no mutual diplomatic recognition and no history of law enforcement cooperation. For the adversary to trace origin, simultaneous cooperation from ISPs across every jurisdiction in the chain would be required. Within any operationally relevant timeframe, this was assessed as impossible. gh0stwire's work was, as always, without a visible seam. The man builds routes the way other people build walls. Nothing gets through unless he decides it does.

// AUTHENTICATION

The weak point in any system: the human beings on both ends of it. Neither the journalist nor the editor could carry persistent credentials. Credentials can be seized. Can be compelled. Can be extracted by methods that don't appear in any legal record. The authentication architecture had to assume full credential compromise at any moment. Had to assume the device holding the key might not be in the hands of the person it belonged to.

Implementation: one-time-use key chain. Generated on an air-gapped machine. Keys distributed via Shamir's Secret Sharing. Threshold: [REDACTED] of [REDACTED]. Physical distribution only. Couriers unaware of contents. Each key valid for sixty minutes from first activation. Single use enforced at the server level in hardware-verified execution. Post-use procedure: the memory region holding the consumed key was immediately overwritten with pseudorandom bytes. No recovery from RAM dump. No recovery from disk image. The key did not expire. It ceased to exist. There is a difference.

CryptK reviewed the implementation. He found one flaw: a timing side-channel in the key derivation function. Observable under controlled conditions with sufficient measurement resolution. He was correct. The flaw was corrected. He reviewed again. And again. His final assessment, delivered verbatim: "adequate."

From CryptK, adequate is a standing ovation. We moved forward.

// OPERATION

Window: nineteen hours.

Journalist authenticated. Upload completed. Documents received. Integrity verified.
Editor authenticated. Download completed. Delivery confirmed.
Dead man's switch maintained throughout.
Tripwires: zero triggered.
Anomalies detected: zero.
Intrusion: none.

Confirmation of delivery received. Self-destruct triggered manually. Waiting for a natural endpoint was not considered. Patience is not a virtue I have chosen to develop.

Disk: overwritten. Hardware: disposed of. [METHOD REDACTED]. Thorough. Permanent.

// OUTCOME

The documents were published. The investigation is ongoing. The journalist is unharmed. The editor is unharmed. The powerful men are, at time of writing, considerably less comfortable than they were before these events that did not occur.

This document is a work of fiction submitted for creative and entertainment purposes only. Any resemblance to actual operations, actual hardware, actual routing infrastructure, or actual servers is coincidental and legally meaningless.

The server never existed.

As for the submarine — it also doesn't exist. But its crew are professionals. And they are very good at staying quiet.

— Ph4ntom, 2026

Back to SETEC LABS