Security Model
Security Layers
┌─────────────────────────────────────────────────┐
│ Application Layer E2E │
│ (Chat, Marketplace, etc.) │
├─────────────────────────────────────────────────┤
│ Onion Routing (3 hops) │
│ X25519 + ChaCha20-Poly1305 │
├─────────────────────────────────────────────────┤
│ Transport Encryption │
│ TLS 1.3 │
├─────────────────────────────────────────────────┤
│ Traffic Analysis Resistance │
│ Padding, Mixing, Timing Obfuscation │
├─────────────────────────────────────────────────┤
│ Anti-Sybil (PoW) │
│ Peer Scoring, Rate Limiting │
└─────────────────────────────────────────────────┘Cryptographic Primitives
Purpose
Algorithm
Key Size
Security Guarantees
Confidentiality
Integrity
Anonymity
Availability
Threat Model
What We Protect Against
Threat
Mitigation
What We Don't Protect Against
Threat
Reason
Attack Scenarios
Scenario 1: ISP Monitoring
Scenario 2: Malicious Node
Scenario 3: Network Injection
Scenario 4: Sybil Attack
Best Practices
For Users
For Node Operators
Security Audits
Responsible Disclosure
Known Limitations
Last updated

