Project-3301 is under active development. Features may change.

Features

Comprehensive security and privacy features designed for the modern age

Core Security Features

P2P Encrypted Messaging

Direct peer-to-peer communication with end-to-end encryption using post-quantum cryptographic algorithms.

  • Kyber-1024 for key exchange
  • Dilithium-5 for signatures
  • AES-256-GCM for message encryption

Tor-Native Connection

Built-in Tor integration provides anonymous routing and IP address protection by default.

  • Automatic Tor circuit creation
  • Hidden service support
  • No IP address exposure

Zero Metadata Storage

Absolutely no metadata is stored on servers. Complete privacy by architectural design.

  • No message timestamps
  • No contact lists on server
  • No IP logs

Proof-of-Work Anti-Abuse

GPU-resistant proof-of-work system prevents spam and abuse without compromising user privacy.

  • Argon2id-based PoW
  • Adaptive difficulty
  • No user tracking required

Encrypted Safe

Secure local storage for sensitive files with military-grade encryption.

  • AES-256 encryption
  • Local-only storage
  • Password-protected access

Anonymous Identity

No phone number, email, or personal information required. True anonymous communication.

  • Cryptographic identity only
  • No registration required
  • Self-sovereign identity

Advanced Protection

P2P Transactions

Secure peer-to-peer cryptocurrency transactions with built-in wallet integration.

  • Multi-currency support
  • Hardware wallet compatibility
  • Atomic swaps

Hidden Mode

Stealth mode that hides the app from device lists and recent applications.

  • Disguised app icon
  • Panic button for instant hide
  • Decoy mode

Device Integrity Check

Continuous monitoring for rooted devices, debuggers, and tampering attempts.

  • Root/jailbreak detection
  • Anti-debugging protection
  • Code integrity verification

Trust Score System

Behavioral analysis to identify and rate contact trustworthiness without central authority.

  • Local spam detection
  • Behavioral pattern analysis
  • Community-based reputation

Cryptographic Foundation

Post-Quantum Algorithms

  • Kyber-1024 (KEM)
  • Dilithium-5 (Signatures)
  • SPHINCS+ (Backup)

Symmetric Encryption

  • AES-256-GCM
  • ChaCha20-Poly1305
  • XSalsa20

Key Derivation

  • Argon2id
  • HKDF-SHA512
  • PBKDF2-SHA256