Skip to content
HushNet Logo

🕶️ HushNet

Silent. Secure. Sovereign.

Open Source Built with Rust E2EE Privacy


🌐 Vision

HushNet is my attempt to rethink how private communication should work — without intermediaries, analytics, or dependency on corporate servers.

I’m building a communication layer where anyone can talk, share, and sync securely, while keeping full control over their infrastructure.


💡 Principle

Traditional messaging apps rely on centralized trust:
your messages go through someone else’s server — even if they’re encrypted.
That’s still a single point of failure, of censorship, and of visibility.

HushNet takes the opposite approach:

  • The app handles end-to-end encryption natively.
  • The backend is open-source and self-hostable.
  • Anyone can connect to their own instance — or to a public node if they prefer.

No account lock-ins. No mandatory servers. No surveillance economy.
Just pure encrypted communication, wherever you choose to host it.


🔐 Encryption Model

HushNet uses a modern E2EE architecture inspired by the Signal Double Ratchet protocol.
Each user’s device maintains its own key state and updates it after every message,
ensuring forward secrecy and post-compromise security.

🧭 Flow Overview

sequenceDiagram
    participant A as Alice (Client)
    participant SA as Alice's Server
    participant SB as Bob's Server
    participant B as Bob (Client)

    Note over A,B: Prekey generation & publication phase
    A->>SA: Publishes Identity Key + Signed PreKey + One-Time PreKeys
    B->>SB: Publishes Identity Key + Signed PreKey + One-Time PreKeys

    Note over A,B: Session setup
    A->>SB: Retrieves Bob’s prekeys
    A->>A: Derives shared secret (X3DH)
    A->>SA: Sends Encrypted Message (via Double Ratchet)
    SA-->>SB: Forwards Encrypted Message
    SB-->>B: Delivers Ciphertext

    Note over B: Session established
    B->>B: Decrypts with derived shared secret
    B->>A: Replies using updated Double Ratchet keys
Loading

🧩 How It Works

  • The HushNet App (client) manages keys, sessions, and encrypted messages locally.
  • The HushNet Server (Rust backend) acts as a simple message relay — it never sees plaintext.
  • Each user (or organization) can run their own server, register devices, and federate with others.
  • The app lets you select or configure your own node at any time.

This means:

  • You can use the default HushNet node — or self-host your own in a few commands.
  • You can run it privately for your friends, company, or research network.
  • You can fork and extend the protocol freely.

🧠 Philosophy

HushNet is built on three principles:

  1. Silence — communication without noise, tracking, or exposure.
  2. Resilience — networks that survive censorship and compromise.
  3. Transparency — every component open to audit and improvement.

I don’t want users to depend on me — I want them to depend on math.
Encryption replaces trust. Openness replaces authority.


🔐 Core Ideas

  • End-to-End Encryption by Default
  • Forward Secrecy via the Double Ratchet protocol
  • Multi-device support with identity-linked prekeys
  • Federation-Ready Design — connect to your own node or others
  • Zero Metadata Policy — no message content, no analytics, no profiles

Privacy doesn’t require permission.
It requires architecture.


👤 About Me

I’m Adam Elaoumari, a cybersecurity engineer and software developer passionate about privacy, cryptography, and open systems.
I’m currently completing a dual MSc in Cyber Security (University of Kent, UK) and Information Technology (EPITECH, France).

I spend most of my time designing and building secure architectures — from end-to-end encryption protocols to network analysis and evasion-resilient detection systems.

HushNet is my way of turning years of study and experimentation into something concrete:
a proof that privacy can be practical, open, and self-hosted.

You can explore more of my work here:
🔗 github.com/AdamLBS
🌍 admlbs.fr


⚖️ License

Everything under HushNet is open source and free to use, study, or modify.
Code is released under permissive licenses (MIT or Apache-2.0).
Security should thrive in the open — not behind NDAs.


"The quietest networks are the hardest to break."
— HushNet

Popular repositories Loading

  1. HushNet-Backend HushNet-Backend Public

    Rust 5

  2. HushNet-Frontend HushNet-Frontend Public

    Dart 4

  3. .github .github Public

  4. HushNet-Registry HushNet-Registry Public

    Rust

Repositories

Showing 4 of 4 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…