This document provides a guided tour of the protocol specification in MAIN.md.
- Confidentiality: message contents remain secret.
- Integrity: messages cannot be modified without detection.
- Forward secrecy: compromising long-term keys does not reveal old messages.
- Metadata minimization: relay nodes learn only per-hop routing information.
- Guaranteed availability under sustained DoS.
- Perfect resistance against a truly global passive adversary.
- Security if endpoints are permanently compromised.
- Identity layer
- Long-term identity keys authenticate who you are.
- Session establishment (handshake)
- Hybrid key establishment combines classical and post-quantum secrets.
- Messaging layer
- Double Ratchet derives one-time message keys.
- Transport / mesh routing
- Messages are wrapped into fixed-size cells and forwarded hop-by-hop.
MAIN.md→ “Threat Model” and “Key Lifecycle”docs/GLOSSARY.md(reference as needed)MAIN.md→ “Handshake Protocol”docs/EXAMPLES.md(handshake walkthrough)MAIN.md→ “Message Encryption” and “Metadata Handling”
- MUST / SHOULD / MAY are interpreted per RFC 2119.
- Example blocks are illustrative; the normative rules are in
MAIN.md.