Project-3301 is under active development. Features may change.

System Architecture

Technical overview of Project-3301's security architecture

Network Layer

  • Tor Integration: All connections routed through Tor network for IP anonymity
  • P2P Mesh: Direct peer-to-peer connections without central servers
  • Rotating Keys: Ephemeral session keys rotated every 24 hours

Cryptography Stack

Post-Quantum

  • Kyber-1024 (Key Encapsulation)
  • Dilithium-5 (Digital Signatures)
  • SPHINCS+ (Backup Signatures)

Symmetric

  • AES-256-GCM (Message Encryption)
  • ChaCha20-Poly1305 (Stream Cipher)
  • Argon2id (Key Derivation)

Anti-Abuse System

Proof-of-Work: Argon2id-based PoW prevents spam without tracking users

Adaptive Difficulty: Automatically adjusts based on network conditions

Rate Limiting: Local rate limiting without server-side tracking

Message Lifecycle

  1. 1. Message composed and encrypted locally with recipient's public key
  2. 2. PoW computed to prevent spam
  3. 3. Encrypted message sent through Tor to recipient's node
  4. 4. Recipient verifies PoW and decrypts message locally
  5. 5. No metadata stored on any server

Storage Architecture

Local Storage

  • All messages stored locally only
  • Encrypted with user's master key
  • SQLite database with encryption

Server Storage

  • Zero message storage
  • No metadata collection
  • Temporary routing only

Identity System

Users are identified solely by their cryptographic public keys. No phone numbers, emails, or personal information required.

  • Self-sovereign identity
  • Optional username system (non-unique)
  • Trust score based on behavior, not identity

Platform Support

Android
8.0+
iOS
14.0+
Windows
10+
macOS
11.0+