Secure, decentralized transport with developer‑first tooling
Custom certificate handling, modern cryptographic primitives, and visibility tools you can trust.
👋 Welcome Users — developers, researchers, and enthusiasts. Your curiosity and contributions are valued.
About the project
This initiative is built on collaboration, innovation, and a shared commitment to secure, sustainable technology.
Sustainability
Tools and systems designed for off‑grid localhost living and resource efficiency.
Security
Protocols and frameworks that prioritize privacy, integrity, and decentralized trust.
Automation
Intelligent agents that streamline workflows and optimize resource allocation.
Network security
- XTTPS/XSSL: Custom encrypted transport layer with decentralized certificate validation.
- Session Management: Secure handshake, certificate exchange, and encrypted payload delivery.
- Privacy‑First Design: No third‑party tracking, minimal metadata exposure, robust timeout handling.
// Minimal XTTP header example
X-Session-Token:
X-Cert-Hash:
X-Nonce:
XTTPS runtime
- Session lifecycle: Initiates, maintains, and terminates encrypted sessions with custom handshakes.
- Header management: XTTP schemas with fields like X‑Session‑Token, X‑Cert‑Hash, and X‑Nonce.
- Payload encryption: AES‑GCM or ChaCha20; optional layered/onion encryption.
- Stateful context: Tokens, timestamps, and peer metadata tracking.
- Extensibility hooks: Middleware for logging, rate‑limits, and protocol upgrades.
Suggested modules
- xttps_core.py: Session orchestration and packet routing
- xttp_headers.py: Header schema, validation, and formatting
- session_store.py: In‑memory or persistent session tracking
Quick start snippet
# Pseudocode: start a secure session
ctx = SessionContext()
token = ctx.issue_token()
nonce = ctx.new_nonce()
headers = {
"X-Session-Token": token,
"X-Cert-Hash": blake3(cert_bytes).hex(),
"X-Nonce": nonce.hex(),
}
payload = aead_encrypt(key, serialize(msg), aad=headers)
send_xttp(headers, payload)
XSSL certification
- Certificate issuance: Identity hash, public key, expiry, and optional metadata.
- Verification logic: Trust anchors, revocation checks, and signature validation.
- Decentralized authority: Web of Trust, blockchain anchoring, or quorum endorsement.
- Schema definition: JSON schema for interoperability and validation.
Suggested modules
- issuer.py: Certificate generation and signing
- verifier.py: Chain validation and trust logic
- schema.json: Certificate format and constraints
Example certificate schema
{
"$schema": "https://json-schema.org/draft/2020-12/schema",
"title": "XSSL Certificate",
"type": "object",
"properties": {
"identity_hash": { "type": "string" },
"public_key": { "type": "string" },
"expiry": { "type": "string", "format": "date-time" },
"metadata": { "type": "object" },
"signature": { "type": "string" }
},
"required": ["identity_hash", "public_key", "expiry", "signature"]
}
Security primitives
- Hashing: SHA‑3, Blake3, optionally domain‑separated hashes.
- Signing: ECDSA, Ed25519, and post‑quantum options like Dilithium.
- Encryption: AES‑GCM, ChaCha20‑Poly1305, hybrid schemes (ECIES).
- Benchmarking: Performance tests across platforms and payload sizes.
Suggested modules
- primitives.py: Core cryptographic functions
- tests/: Unit tests and benchmarks
- utils.py: Key generation, encoding, padding helpers
Benchmark sample output
# Throughput (MiB/s) — illustrative
SHA-3-256: 95.2
BLAKE3: 1050.4
AES-GCM: 820.7 (128-bit key)
ChaCha20-Poly1305: 910.1
Tooling & docs
- Test runner: CLI to execute protocol tests, validate headers, and simulate sessions.
- Packet inspector: Visualizes XTTP packets, headers, payloads, debug mode, and hex dumps.
- Integration guides: Runtime setup, certificate handling, and protocol flows.
- Examples: Sample configs, test packets, annotated flows for quick prototyping.
Suggested modules
- test_runner.py: CLI test suite
- packet_inspector.py: XTTP packet visualization
- docs/: Markdown guides and specs
- examples/: Sample flows and configs
CLI example
# Invoke tests
python -m xttps.tests --suite full --verbose
# Inspect a captured packet
python packet_inspector.py --file sample.xttp --hex --debug
Contact information
For questions, contributions, or collaboration: