A Free, Open Source Solution For Secure Application To Application Communication
Eclipse creates a simple, high speed system for allowing applications to speak to each other. It was made around supporting different applications, APIs and even local LLMs. It does so in a way where injecting false requests or reading the results of a request is almost impossible to outside programs. Atop this, it uses NIST recommended PQC algorithms such as AES-256-GCM and KYBER-Crystals.
Cross Platform • Fully Offline • Post Quantum Computing Resistant • No BS
- Expose any static method with one attribute → instantly callable over secure channel
- Strong mutual authentication & encryption using pre-shared keys + ephemeral Kyber-based key exchange
- AES-256-GCM for request/response payloads
- Hard for third-party processes to inject or read traffic
- Designed for local-first scenarios (desktop apps ↔ local LLMs ↔ tools ↔ services)
- No central server required beyond the machine itself
The following (Free, Open Source Solutions on our Github) libraries are required for this to workl
- Pariah Cybersecurity - Secure Store
Also, be sure your project references both Eclipse and EclipseLCL!
Finally, check these out!
XRUIOS.Barebones; the project this was made for and
XRUIOS.Dirac; the implementation of this on a real setting!
![]() |
![]() |
![]() |
|---|---|---|
| Jpena173 Backend Support / Development Help GitHub "You are your strongest advocate, capable of more than you'd think." |
WalkerDev Founder / Lead Developer “Don't be afraid of change—Think of it as something that'll open the door to deeper, more precious feelings for you in the future.” YouTube |
Chubu QA & VN Artist "If you don't know how to do something, keep doing it! You'll figure it out eventually! :3" |
- Server-side: mark methods with
[SeaOfDirac(...)]→ they become discoverable & callable - Server runs with one line:
EclipseServer.RunServer("MyServerName") - Client discovers server address (via SecureStore or other mechanism)
- Client performs secure enrollment + handshake (PSK + Kyber + nonces + transcript)
- Client sends encrypted
DiracRequest→ server executes → encryptedDiracResponsereturned - End-to-end confidentiality, integrity, and freshness via AEAD + transcript proofs
- Enrollment → registers client ID + PSK
- Handshake → Kyber-encrypted key exchange → shared secret
- Session → AES-256-GCM + per-message nonces
- Transcript → HMAC-protected log of handshake messages → prevents downgrade & MITM
- Designed to resist classical & quantum adversaries (where Kyber helps)
Code
NON-AI MPL 2.0
This software is licensed under MPL 2.0 with the following exception:
Artwork
© Chubu — NO AI training. NO reproduction. NO exceptions.
Unauthorized use of the artwork — including copying, distribution, modification, or inclusion in any machine-learning training dataset — is strictly prohibited and will be prosecuted to the fullest extent of the law.



