System Architecture
Technical overview of Project-3301's security architecture
Network Layer
-
•
Tor Integration: All connections routed through Tor network for IP anonymity
-
•
P2P Mesh: Direct peer-to-peer connections without central servers
-
•
Rotating Keys: Ephemeral session keys rotated every 24 hours
Cryptography Stack
Post-Quantum
- Kyber-1024 (Key Encapsulation)
- Dilithium-5 (Digital Signatures)
- SPHINCS+ (Backup Signatures)
Symmetric
- AES-256-GCM (Message Encryption)
- ChaCha20-Poly1305 (Stream Cipher)
- Argon2id (Key Derivation)
Anti-Abuse System
Proof-of-Work: Argon2id-based PoW prevents spam without tracking users
Adaptive Difficulty: Automatically adjusts based on network conditions
Rate Limiting: Local rate limiting without server-side tracking
Message Lifecycle
- 1. Message composed and encrypted locally with recipient's public key
- 2. PoW computed to prevent spam
- 3. Encrypted message sent through Tor to recipient's node
- 4. Recipient verifies PoW and decrypts message locally
- 5. No metadata stored on any server
Storage Architecture
Local Storage
- All messages stored locally only
- Encrypted with user's master key
- SQLite database with encryption
Server Storage
- Zero message storage
- No metadata collection
- Temporary routing only
Identity System
Users are identified solely by their cryptographic public keys. No phone numbers, emails, or personal information required.
- • Self-sovereign identity
- • Optional username system (non-unique)
- • Trust score based on behavior, not identity
Platform Support
Android
8.0+
iOS
14.0+
Windows
10+
macOS
11.0+