v0.1.0 — Active Development · GCD4F 2026

Infrastructure
for Human Dignity

A decentralized, censorship-resistant communication mesh.
No servers. No owners. Built for when the internet goes dark.

P2PNo Central Server
AES-256End-to-End Encrypted
RustMemory-Safe Core
AILearned Routing
7Transport Layers
2.6 billion people lack reliable internet access. When disasters strike, infrastructure fails, or communities are remote — traditional communication breaks down precisely when coordination is most critical. GhostWire exists because connectivity is a human right, not a luxury.

Built for those the internet forgot

Click any card to learn how GhostWire helps your specific situation.

Disaster Responders

Coordinate when cell towers fail. Works on battery and solar.

Click to learn more →

Privacy Advocates

Communicate without corporate surveillance. No logs. No traces.

Click to learn more →

Rural Communities

Mesh nodes for entire villages. AI-powered routing learns optimal paths.

Click to learn more →

Activists & Journalists

Coordinate without infiltration. Disposable identities. Mesh during protests.

Click to learn more →

Whistleblowers

Send documents without revealing identity. Tor integration supported.

Click to learn more →

Developers & Researchers

AGPL-licensed. Built in Rust. AI models trained on real mesh data.

Click to learn more →

Mesh networking for the real world

Messages hop node-to-node. Remove any node — the mesh routes around it.

01

No central server

Devices connect directly via libp2p. Pure P2P, no single point of failure.

02

7 transport layers

WiFi Direct, Bluetooth LE, LoRa, WebRTC, TCP/IP, Reticulum, Briar. Falls back to RF mesh automatically.

03

AI-powered routing

LightGBM anomaly detection (76.7μs) + GNN trained on real GuifiSants mesh data.

04

End-to-end encrypted

AES-256-GCM, X25519 key exchange, post-quantum ML-KEM-768 ready.

05

Delay-tolerant delivery

Messages queue when peers are offline. Delivered when the network reconnects.

Built on proven cryptographic foundations

Click any card to understand what it is and why we use it.

Encryption

AES-256-GCM

Industry-standard authenticated encryption. No server ever sees plaintext.

Click to learn more →
Key Exchange

Ed25519 / X25519

Modern elliptic curve cryptography. Perfect forward secrecy. Keys never leave your device.

Click to learn more →
Post-Quantum

ML-KEM-768

NIST-standardized post-quantum key encapsulation. Protects against future quantum computers.

Click to learn more →
Networking

libp2p + Kademlia DHT

Proven P2P networking used by IPFS and Ethereum. Gossipsub messaging.

Click to learn more →
AI Routing

LightGBM + GNN

L1 anomaly detector: AUC 1.0, 76.7μs. L3 GNN on 7,931 real mesh samples.

Click to learn more →
Defense

Sybil resistance

Proof-of-work node admission. Reputation system with TrustStore.

Click to learn more →
Privacy

Traffic obfuscation

Cover traffic, timing randomization, stealth TCP. Makes analysis harder.

Click to learn more →
Monitoring

Real-time dashboard

Interactive mesh topology. Live CPU, RAM, network metrics. Axum HTTP API.

Click to learn more →
Identity

Multi-profile support

Separate identities for different contexts. Username discovery. QR pairing.

Click to learn more →

The internet was built to be ungovernable.

In Hindu and Buddhist cosmology, Indra's Net is an infinite web. At each intersection hangs a jewel. Each reflected in all others. No jewel is more important. The net has no center. The net has no edge.

The original internet architects independently rediscovered what African philosophy had encoded for millennia: systems built on mutual relationship rather than central authority are more resilient, more equitable, and more aligned with existence itself.

Ubuntu — I am because we are. The stranger is a node that has not yet connected to the net.

— From GhostWire: The First Root of Yggdrasil

Read the full manifesto
I.

Connection cannot be owned. Information wants to be free not because someone decided this, but because this is its nature.

II.

Power distributed is power that cannot be seized. The architecture itself is the philosophy.

III.

Ubuntu — I am because we are. The stranger is a node that has not yet connected to the net.

IV.

GhostWire begins here: not as a product, but as a restoration. The first root of Yggdrasil.

What GhostWire does NOT protect against

Honest security requires honest limitations. Click each card for details and mitigation steps.

Physical device seizure

If your device is seized, local data may be at risk.

Click for mitigation steps →

Full anonymity

Strong privacy, not complete anonymity. Traffic analysis remains a risk.

Click to understand why →

Endpoint compromise

If either device has malware, encryption can't protect content at that endpoint.

Click for best practices →

Not yet independently audited

No third-party security audit yet. Internal audits available in docs/.

Click for details →

Running in under 5 minutes

# Clone and install
git clone https://github.com/Phantomojo/GhostWire-secure-mesh-communication.git
cd GhostWire-secure-mesh-communication
./scripts/install.sh

# Start GhostWire
./scripts/ghostwire.sh start

# Open the dashboard
http://localhost:8080
# Pull and run
docker-compose up -d

# Check health
curl http://localhost:9000/api/v2/health

# Expected output
{"status":"healthy","version":"0.1.0"}
# Prerequisites: Rust 1.75+, Node 18+
git clone https://github.com/Phantomojo/GhostWire-secure-mesh-communication.git
cd GhostWire-secure-mesh-communication/ghostwire

# Build the backend
cargo build --release

# Build the frontend
cd ../webui-src && npm install && npm run build

Open infrastructure, open community