Safe. Secure. Sovereign.
Decentralized, ephemeral peer-to-peer messaging. No servers store your messages. No accounts to breach. Your config file is your identity — upload it and you're you.
Messages are transient. They exist in memory during transit and are never persisted. No server stores your history. No database to subpoena.
No central servers, no authority, no single point of failure. Every node contributes to resilience. The network self-organizes.
Your Ed25519 keypair is your identity. Private keys never leave your device. No passwords, no accounts, no third-party authentication.
There are no accounts. No passwords. No sessions stored on a server. Your configuration file IS your identity. It contains your keypair, your channels, your contacts' public keys, and your peer list. Upload it to any node and you're authenticated. Download it when you leave. The node forgets you existed.
Every message is signed. Every signature is verified at every hop. No impersonation possible.
Messages are padded to fixed sizes (1KB/4KB/16KB/64KB) to prevent traffic analysis. Observers can't distinguish message types by size.
Time-to-live counters control message propagation depth. Messages spread through the network efficiently without flooding.
Nodes discover peers and build diverse connection graphs automatically. The network adapts and self-heals.
Channel-specific pseudonyms let you participate in public channels without revealing your global identity.
Private channels use AES-256 symmetric keys. Public channels are open. Direct messages are encrypted to the recipient's public key.
Two options to join the network:
Upload your config — already have a keypair? Upload your configuration file to rejoin your channels and contacts instantly.
Create a new identity — generate a fresh Ed25519 keypair and subscribe to default channels. Your keys are created locally and never touch a server.
Want to run your own node? Clone the repo and start contributing to network resilience:
The theoretical foundation behind HermesP2P's design decisions around ephemeral communication, key sovereignty, and decentralized trust.
Read the Book View on GitHub