GhostWire is a decentralized networking protocol β not an app. It provides the cryptographic, routing, and transport layers that developers can build communication tools on top of.
The reference implementation is written in Rust and includes a working mesh node with encrypted messaging, AI-powered routing, post-quantum cryptography, and delay-tolerant networking.
Built for: Disaster responders, rural communities, privacy advocates, researchers, and anyone who needs communication that works regardless of the odds.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β APPLICATION: Messaging β Knowledge Ark β Ghost Channelsβ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β API: REST (Axum) β WebSocket β CLI β TUI β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β SERVICES: BlockStore β Mailbox β Social β Sphinx β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β AI ROUTING: LightGBM β Gemma 4 β GNN β PRoPHET β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β CRYPTO: XChaCha20-Poly1305 β X25519 β ML-KEM-768 β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β TRANSPORTS: StealthTCP β WebRTC β BLE β LoRa β obfs4 β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β MESH: libp2p GossipSub β Kademlia DHT β DTN β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Full specification: docs/spec/PROTOCOL.md
| Capability | Description |
|---|---|
| π‘οΈ Encrypted P2P | XChaCha20-Poly1305 E2E encryption with X25519 key exchange and forward secrecy ratchet |
| π Serverless Mesh | Pure P2P via libp2p β no central point of failure, no cloud dependency |
| π€ AI Routing | 4-layer ML stack (LightGBM β Gemma 4 β GNN β PRoPHET) for optimal path selection |
| π‘ Delay-Tolerant | PRoPHET epidemic routing β messages survive network partitions via store-carry-forward |
| π Post-Quantum | ML-KEM-768 (Kyber-768) hybrid key exchange β defends against harvest-now-decrypt-later |
| π Anonymous Routing | Sphinx onion routing (same protocol as Nym and Lightning Network) with SURBs |
| πΆ Multi-Transport | TCP, WebRTC, Bluetooth LE, LoRa, Reticulum β auto-failover based on conditions |
| π‘οΈ Censorship Resistance | 4 pluggable transport modes (WebSocket, Shadowsocks, TLS, obfs4) with traffic armor |
| π¨ Coercion Resistance | Duress PIN, panic wipe, dead man's switch β protection against physical coercion |
| π§ Web of Trust | TOFU key pinning with signed attestations and computed trust scores |
| π Knowledge Ark | Decentralized knowledge commons β share code, docs, datasets across the mesh |
| π Protocol Bridges | Interoperability with Matrix, Meshtastic, Briar, Reticulum networks |
git clone https://github.com/Phantomojo/GhostWire-secure-mesh-communication.git
cd GhostWire-secure-mesh-communication/ghostwire
cargo run --releaseThe node starts on http://127.0.0.1:8080. Mesh networking activates with --mesh-port.
cargo run --release -- tuiTerminal interface with dashboard, peer list, message history, and compose β all in one screen.
| Key | Action |
|---|---|
Tab |
Switch tabs |
i |
Compose message |
q |
Quit |
Full installation guide: docs/INSTALL.md
GhostWire is a protocol, not just an application. You can build on it in three ways:
[dependencies]
ghostwire = { git = "https://github.com/Phantomojo/GhostWire-secure-mesh-communication.git" }Start a GhostWire node, then interact via HTTP/WebSocket from any language.
Follow the specifications in docs/spec/ to build your own implementation in any language.
Developer guide: docs/build/OVERVIEW.md
| Crate | Description | Status |
|---|---|---|
| sphinx-rs | Sphinx onion routing with SURBs | β 0.1.0 on crates.io |
| ghostwire-dtn | Delay-tolerant networking (PRoPHET) | π§ Next |
| hlc-rs | Hybrid Logical Clocks | π§ Planned |
| trust-store | Web of Trust + TOFU | π§ Planned |
| Feature | GhostWire | libp2p | Matrix | Nostr | I2P |
|---|---|---|---|---|---|
| P2P mesh networking | β | β | β | β | β |
| Built-in encryption | β | β | β | β | β |
| Anonymous routing | β | β | β | β | β |
| Delay-tolerant networking | β | β | β | β | β |
| AI-powered routing | β | β | β | β | β |
| Post-quantum crypto | β | β | β | β | β |
| Multi-transport | β | β | β | β | β |
| Offline messaging | β | β | β | β | β |
| Censorship resistance | β | β | β | β | β |
| Coercion resistance | β | β | β | β | β |
GhostWire is most similar to libp2p (modular P2P stack) and I2P (anonymous network layer), with unique additions in AI routing, delay-tolerant networking, and post-quantum cryptography.
graph TD;
subgraph "User Interface"
WebUI["React Web Interface"]
CLI["Rust Command-Line Interface"]
TUI["Terminal User Interface"]
end
subgraph "GhostWire Core (Rust)"
Core["Core Manager"]
Identity["Identity Manager"]
Kademlia["DHT / Kademlia (libp2p)"]
Swarm["Swarm Controller (libp2p)"]
Security["Security Manager"]
Transport["Adaptive Transport System"]
end
subgraph "Network Layer"
TCP["Stealth TCP"]
WebRTC["WebRTC (P2P)"]
LoRa["LoRa (Long Range)"]
BT["Bluetooth LE"]
end
subgraph "Protocol Bridges"
Briar["Briar Adapter"]
Meshtastic["Meshtastic Adapter"]
Matrix["Matrix Bridge"]
end
WebUI <-->|REST / WebSocket| Core
CLI <-->|Direct API| Core
TUI <-->|Direct API| Core
Core <--> Identity
Core <--> Kademlia
Core <--> Swarm
Core <--> Security
Swarm <--> Transport
Transport <--> TCP
Transport <--> WebRTC
Transport <--> LoRa
Transport <--> BT
Core <--> Briar
Core <--> Meshtastic
Core <--> Matrix
Deep dive: docs/ARCHITECTURE.md
| Guide | Description |
|---|---|
| π Protocol Spec | Formal protocol specification (like NIPs / Matrix Spec) |
| ποΈ Architecture | System internals and design decisions |
| π οΈ Installation | Detailed setup for various platforms |
| π Security | Security model and vulnerability disclosure |
| π‘ First Ping | First cross-machine mesh communication record |
| π€ AI Integration | Gemma 4 and AI routing setup |
| π§ Build Instructions | Compilation and development guide |
| ποΈ Build on GhostWire | How to build applications on the protocol |
| π Governance | Protocol evolution process (GIPs) |
| π Wiki | Full project knowledge base |
GhostWire is submitted to the Global Competition on Design for Futures (GCD4F) 2026, organized by Beijing Normal University and UNESCO IITE.
| Detail | Information |
|---|---|
| Track | Higher Education β AI for Society |
| Team | Team GhostWire |
| Institution | Open University of Kenya |
| Theme | AI for Society |
| SDG Alignment | SDG 9 (Infrastructure), SDG 11 (Communities), SDG 17 (Partnerships) |
We welcome contributors across all layers of the protocol:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Make your changes
- Test thoroughly
- Submit a pull request
- π¦ Rust β libp2p networking, transport layers, crypto, AI routing
- π Python β ML model training, data pipelines, GNN optimization
- π TypeScript/React β Web UI, dashboard, visualization
- π Documentation β Protocol specs, guides, translations
- π§ͺ Testing β Write tests, report issues, penetration testing
- π Security β Cryptographic analysis, threat modeling, audits
- π Bridges β Matrix, Meshtastic, Briar, Reticulum adapters
Guidelines: CONTRIBUTING.md | Code of Conduct
GhostWire is dual-licensed:
| License | Use Case | Cost |
|---|---|---|
| π AGPL-3.0-or-later | Personal, Research, Education, Open Source | Free |
| π’ Commercial License | Proprietary Products, SaaS, Closed-Source | Contact for pricing |
Library crates (sphinx-rs, ghostwire-dtn, etc.) are licensed under MIT + Apache-2.0 for permissive use.
| Your Use Case | License |
|---|---|
| Personal projects | β AGPL-3.0 (free) |
| University research | β AGPL-3.0 (free) |
| Open source projects | β AGPL-3.0 (free) |
| Using library crates | β MIT + Apache-2.0 (free) |
| Proprietary products | π’ Commercial |
| SaaS without source disclosure | π’ Commercial |
Commercial inquiries: mirungu015@proton.me
Full terms: LICENSE | COMMERCIAL_LICENSE.md | LICENSE_EXPLANATION.md
Team GhostWire β Open University of Kenya, Nairobi
| Name | Role | Contact |
|---|---|---|
| Michael Irungu Muriithi | Team Lead, Protocol Architecture | mirungu015@proton.me |
Advisors & Contributors:
- Frank β Technical Advisor
- Austin β Hardware Lead (Mechatronics)
- π Documentation: docs/
- π¬ Discussions: GitHub Discussions
- π Bug Reports: GitHub Issues
- π§ Contact: mirungu015@proton.me
- β Star this repo to get release notifications
- π Watch for major updates
- π Security Policy: docs/SECURITY.md
- π¨ Report Vulnerability: GitHub Security Advisories or mirungu015@proton.me
- P2P mesh networking β libp2p GossipSub + Kademlia DHT
- End-to-end encryption β XChaCha20-Poly1305 with X25519
- Forward secrecy β Symmetric ratchet
- AI routing β LightGBM + PRoPHET fallback (4-layer system)
- Terminal UI β Ratatui dashboard
- Web API β Axum HTTP server
- Anomaly detection β Isolation Forest
- Shamir recovery β Secret sharing for key recovery
- First cross-machine ping β April 5, 2026
- Protocol specifications β Formal specs in docs/spec/
- Sphinx onion routing β Published as sphinx-rs crate
- Message persistence and history
- Full Double Ratchet with DH steps
- GNN routing optimization (target: 85%+ accuracy)
- Mobile clients (Tauri Android/iOS)
- ghostwire-dtn crate publication
- Voice over mesh (VoIP)
- LoRa/Reticulum bridge (production)
- Protocol adapters (Matrix, Meshtastic, Briar)
- Knowledge Ark β offline content serving
- Zero-knowledge proofs
- Third-party security audit
GhostWire β An open protocol for resilient peer-to-peer communication.
π Nairobi, Kenya | π Website | π§ mirungu015@proton.me
Licensed under AGPL-3.0-or-later or Commercial License
GCD4F 2026 Submission β Global Competition on Design for Futures