This is not a real protocol, but a highly experimental and totally-not-not-at-all-secure method of data transfer.
For more info on how to use this protocol, see:
This page is brought to you by the International Association of Incompetent Network Engineers.