Skip to Content
 FOR COLLAB?    Contact us

We don’t publish. We deploy.

We don’t sell books — we distribute encoded experiences.

Our eBooks are crafted to simulate mental breaches, blending deep narrative with emotional distortion and cognitive tension.

Whether masked as fiction, philosophy, or education, each file is a trigger — designed to immerse, provoke, and destabilize.

Not made for everyone. Made for those who hear the signal.

Initiate Protocol




OUR MISSION

We don’t publish books.

We release controlled breaches — devices masked as fiction.

Each document is engineered to distort identity, fracture perception, and override emotional stability.

This is not literature.

This is psychological warfare


Digital Infiltration Set

Recently Declassified Protocols Now Available for Civilian Access.


 THE PROTOCOL 


Unsealed Directive

The first page of the unsealed document. Classified intelligence, redacted history, and rewritten identity protocols begin here.

Entry beyond this point implies consent to psychological recalibration.


Creator's Mark

A crimson sigil burned into black — the signature of the Architect. Not a brand, but a boundary. What begins here is no longer reversible.

This mark watches. It does not forget.


Final Protocol

The document ends, but the effects do not. This is the final directive, the unresolved residue. The warning embedded in silence

If you can still hear yourself… you weren’t the target


Endorsed by literary experts


Interested in our e-books?



Initiate Protocol