โ— PHANTOM
๐Ÿ‡ฎ๐Ÿ‡ณ IN
โœ•
Skip to content

Project ComLock is a high-assurance, metadata-resistant messaging infrastructure designed to operate in adversarial environments where the network layer is assumed to be fully compromised by a Global Passive Adversary (GPA). Recognizing the imminent threat of "Harvest Now, Decrypt Later" surveillance strategies.

Notifications You must be signed in to change notification settings

ElMoorish/ComLock

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Post-Quantum Ready Mixnet Anonymous E2E Encrypted

๐Ÿ” ComLock

Quantum-Resistant Encrypted Messaging
Privacy that survives tomorrow's threats


โšก Features

Feature Description
๐Ÿ”’ ML-KEM-1024 NIST-approved post-quantum key encapsulation
๐Ÿง… Mixnet Transport Katzenpost-based anonymous routing
๐Ÿ”‘ Double Ratchet Forward secrecy with X3DH key exchange
๐Ÿ“ฑ Cross-Platform Desktop + Android (Tauri + React)
๐Ÿ—๏ธ BIP-39 Recovery 24-word mnemonic seed backup
๐Ÿ”ฅ Secure Wipe Zero-overwrite sensitive data deletion

๐Ÿ—๏ธ Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                      ComLock App                         โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚  React UI  โ”‚  Tauri Commands  โ”‚  Rust Backend            โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚            comlock-crypto (Double Ratchet + Kyber)       โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚            comlock-transport (Sphinx + Katzenpost)       โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๏ฟฝ Cryptography Stack

Layer Algorithm Purpose
Key Exchange X25519 + ML-KEM-1024 Hybrid post-quantum
Signatures Ed25519 Authentication
Encryption AES-256-GCM Message encryption
Key Derivation Argon2id PIN-to-key derivation
Recovery BIP-39 Mnemonic seed phrases

๐Ÿš€ Quick Start

# Clone
git clone https://github.com/ElMoorish/ComLock.git
cd ComLock

# Install dependencies
cd comlock-app
npm install

# Run desktop app
npm run tauri dev

# Build Android
npm run tauri android build

๐Ÿ“ฆ Project Structure

ComLock/
โ”œโ”€โ”€ comlock-app/          # Tauri + React application
โ”‚   โ”œโ”€โ”€ src/              # React frontend
โ”‚   โ””โ”€โ”€ src-tauri/        # Rust backend
โ”œโ”€โ”€ comlock-crypto/       # Post-quantum cryptography
โ””โ”€โ”€ comlock-transport/    # Mixnet transport layer

๐Ÿ›ก๏ธ Security Model

  • Zero Trust: All messages encrypted end-to-end
  • Forward Secrecy: Compromised keys don't reveal past messages
  • Post-Quantum: Resistant to quantum computer attacks
  • Anonymity: Mixnet hides metadata and traffic patterns
  • Deniability: No long-term identity proofs stored

๐Ÿ“‹ Roadmap

  • Core cryptography (ML-KEM-1024, Double Ratchet)
  • Katzenpost mixnet client
  • Encrypted local storage
  • Android APK builds
  • iOS support
  • Production mixnet deployment
  • Group messaging

โš ๏ธ Disclaimer

This software is experimental. Use at your own risk. Not audited for production use.


๏ฟฝ Support Development

If you find ComLock useful, consider supporting development:

Bitcoin
17ospCx6MbNQfqETd1UjAQQSus8ENHXgnh
BNB
0x92526bbd4a02baeaedda62208e4c485d852ef66d

Built with ๐Ÿ” for privacy โ€ข MIT License

About

Project ComLock is a high-assurance, metadata-resistant messaging infrastructure designed to operate in adversarial environments where the network layer is assumed to be fully compromised by a Global Passive Adversary (GPA). Recognizing the imminent threat of "Harvest Now, Decrypt Later" surveillance strategies.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published