Documentation
Everything you need to know about Project-3301
Quick Start
- 1. Download and install Project-3301 for your platform
- 2. Launch the app and create your anonymous identity
- 3. Share your public key with contacts
- 4. Start sending encrypted messages
Core Concepts
Anonymous Identity
Your identity is your cryptographic key pair. No phone number, email, or personal information is required or stored.
Trust Scores
Contacts are rated based on their behavior patterns. High trust scores indicate legitimate users, while low scores may indicate spam or abuse.
Proof-of-Work
Each message requires a small computational proof to prevent spam. This happens automatically in the background.
Encrypted Safe
Store sensitive files locally with AES-256 encryption. Files never leave your device.
Security Best Practices
- • Always verify contact public keys through a secondary channel
- • Keep your device updated and secure
- • Use a strong password for the encrypted safe
- • Back up your identity keys securely
- • Be cautious with contacts that have low trust scores
Frequently Asked Questions
Is Project-3301 really anonymous?
Yes. We don't collect phone numbers, emails, or any personal information. Your identity is purely cryptographic.
How does the Tor integration work?
All network traffic is automatically routed through the Tor network, hiding your IP address from other users and servers.
Can messages be recovered if I lose my device?
No. All messages are stored locally only. You should back up your identity keys to recover your account on a new device.
What is post-quantum cryptography?
Cryptographic algorithms designed to resist attacks from quantum computers, ensuring long-term security.