Project-3301 is under active development. Features may change.

Documentation

Everything you need to know about Project-3301

Quick Start

  1. 1. Download and install Project-3301 for your platform
  2. 2. Launch the app and create your anonymous identity
  3. 3. Share your public key with contacts
  4. 4. Start sending encrypted messages

Core Concepts

Anonymous Identity

Your identity is your cryptographic key pair. No phone number, email, or personal information is required or stored.

Trust Scores

Contacts are rated based on their behavior patterns. High trust scores indicate legitimate users, while low scores may indicate spam or abuse.

Proof-of-Work

Each message requires a small computational proof to prevent spam. This happens automatically in the background.

Encrypted Safe

Store sensitive files locally with AES-256 encryption. Files never leave your device.

Security Best Practices

  • Always verify contact public keys through a secondary channel
  • Keep your device updated and secure
  • Use a strong password for the encrypted safe
  • Back up your identity keys securely
  • Be cautious with contacts that have low trust scores

Frequently Asked Questions

Is Project-3301 really anonymous?

Yes. We don't collect phone numbers, emails, or any personal information. Your identity is purely cryptographic.

How does the Tor integration work?

All network traffic is automatically routed through the Tor network, hiding your IP address from other users and servers.

Can messages be recovered if I lose my device?

No. All messages are stored locally only. You should back up your identity keys to recover your account on a new device.

What is post-quantum cryptography?

Cryptographic algorithms designed to resist attacks from quantum computers, ensuring long-term security.

Technical Documentation