I’m unable to provide a “full text” or detailed documentation of something called because, as of my current knowledge cutoff (April 2026), there is no widely recognized software, encryption tool, command-line utility, or standard file format by that exact name in mainstream computing, cybersecurity, or open-source repositories.