A decentralized, censorship-resistant communication mesh.
No servers. No owners. Built for when the internet goes dark.
2.6 billion people lack reliable internet access. When disasters strike, infrastructure fails, or communities are remote — traditional communication breaks down precisely when coordination is most critical. GhostWire exists because connectivity is a human right, not a luxury.
Click any card to learn how GhostWire helps your specific situation.
Coordinate when cell towers fail. Works on battery and solar.
Click to learn more →Communicate without corporate surveillance. No logs. No traces.
Click to learn more →Mesh nodes for entire villages. AI-powered routing learns optimal paths.
Click to learn more →Coordinate without infiltration. Disposable identities. Mesh during protests.
Click to learn more →Send documents without revealing identity. Tor integration supported.
Click to learn more →AGPL-licensed. Built in Rust. AI models trained on real mesh data.
Click to learn more →Messages hop node-to-node. Remove any node — the mesh routes around it.
Devices connect directly via libp2p. Pure P2P, no single point of failure.
WiFi Direct, Bluetooth LE, LoRa, WebRTC, TCP/IP, Reticulum, Briar. Falls back to RF mesh automatically.
LightGBM anomaly detection (76.7μs) + GNN trained on real GuifiSants mesh data.
AES-256-GCM, X25519 key exchange, post-quantum ML-KEM-768 ready.
Messages queue when peers are offline. Delivered when the network reconnects.
Click any card to understand what it is and why we use it.
Industry-standard authenticated encryption. No server ever sees plaintext.
Click to learn more →Modern elliptic curve cryptography. Perfect forward secrecy. Keys never leave your device.
Click to learn more →NIST-standardized post-quantum key encapsulation. Protects against future quantum computers.
Click to learn more →Proven P2P networking used by IPFS and Ethereum. Gossipsub messaging.
Click to learn more →L1 anomaly detector: AUC 1.0, 76.7μs. L3 GNN on 7,931 real mesh samples.
Click to learn more →Proof-of-work node admission. Reputation system with TrustStore.
Click to learn more →Cover traffic, timing randomization, stealth TCP. Makes analysis harder.
Click to learn more →Interactive mesh topology. Live CPU, RAM, network metrics. Axum HTTP API.
Click to learn more →Separate identities for different contexts. Username discovery. QR pairing.
Click to learn more →In Hindu and Buddhist cosmology, Indra's Net is an infinite web. At each intersection hangs a jewel. Each reflected in all others. No jewel is more important. The net has no center. The net has no edge.
The original internet architects independently rediscovered what African philosophy had encoded for millennia: systems built on mutual relationship rather than central authority are more resilient, more equitable, and more aligned with existence itself.
Ubuntu — I am because we are. The stranger is a node that has not yet connected to the net.
— From GhostWire: The First Root of Yggdrasil
Read the full manifestoConnection cannot be owned. Information wants to be free not because someone decided this, but because this is its nature.
Power distributed is power that cannot be seized. The architecture itself is the philosophy.
Ubuntu — I am because we are. The stranger is a node that has not yet connected to the net.
GhostWire begins here: not as a product, but as a restoration. The first root of Yggdrasil.
Honest security requires honest limitations. Click each card for details and mitigation steps.
If your device is seized, local data may be at risk.
Click for mitigation steps →Strong privacy, not complete anonymity. Traffic analysis remains a risk.
Click to understand why →If either device has malware, encryption can't protect content at that endpoint.
Click for best practices →No third-party security audit yet. Internal audits available in docs/.
Click for details →# Clone and install
git clone https://github.com/Phantomojo/GhostWire-secure-mesh-communication.git
cd GhostWire-secure-mesh-communication
./scripts/install.sh
# Start GhostWire
./scripts/ghostwire.sh start
# Open the dashboard
http://localhost:8080# Pull and run
docker-compose up -d
# Check health
curl http://localhost:9000/api/v2/health
# Expected output
{"status":"healthy","version":"0.1.0"}# Prerequisites: Rust 1.75+, Node 18+
git clone https://github.com/Phantomojo/GhostWire-secure-mesh-communication.git
cd GhostWire-secure-mesh-communication/ghostwire
# Build the backend
cargo build --release
# Build the frontend
cd ../webui-src && npm install && npm run buildFull source on GitHub. Report issues, submit PRs, review the code.
github.com/Phantomojo →Reach the team directly. Press inquiries, security reports, partnerships.
mirungu015@proton.me →Rust, TypeScript, documentation, security research, AI model training — all welcome.
Contributing guide →Report vulnerabilities responsibly. Read our security policy and threat model.
Security policy →