Why · 01
Transport agnostic
End-to-end encrypted between peers. Re-encrypted at every hop. Bluetooth, Ethernet, UDP, Tor, Serial — same protocol, same mesh.
A self-organizing encrypted mesh that works over anything you can send packets through.
Why · 01
End-to-end encrypted between peers. Re-encrypted at every hop. Bluetooth, Ethernet, UDP, Tor, Serial — same protocol, same mesh.
Why · 02
If it works over IP today, it works over FIPS — your stack doesn't notice.
This page is served straight from a peer on the FIPS mesh.
No DNS provider. No certificate authority. No exit node.
View source →Why · 03
Connect to one peer, become reachable from anywhere — bloom filters propagate by gossip. When the root dies the tree converges on a new one without losing most of its structure.
Learn & Discover
Understand the protocol from first principles — the layer stack, cryptography, routing, and packet formats.
Run a node, find peers via Nostr, and join a mesh that no one controls. Your keypair is your address.
How It Works
Four layers. Each one does exactly one job. Each one is independently replaceable.
Identity
Your node identity is a Nostr keypair (secp256k1). From that single keypair, three things are deterministically derived — no registration, no authority, no coordination.
The human-readable identifier you share with others. Used by the native API for addressed datagrams.
SHA-256 hash of the public key. Opaque to the mesh — nodes route by this address without knowing who you are.
Deterministically derived for legacy app compatibility. Lets unmodified applications reach any node by IPv6 address.
Get Involved
Tell us what breaks.
Install from GitHub releases, grab a tarball, or build from source. OpenWRT packages available. Docker test meshes for quick experimentation without hardware.
View releases →Test it. Find bugs. Stress the protocol. Try to break the encryption, flood the mesh, disconnect nodes at the worst moment. We want to know what fails before it matters.
Open an issue →The design docs cover everything: protocol layers, packet formats, cryptography, routing algorithms. Start with the architecture overview, then dive into specific layers. 10+ specification documents.
Browse docs →Discussion happens on Nostr. Follow the contributors and check the relevant threads.
Join the conversation →