Open Protocol

Peer-to-peer data
infrastructure.

Discover peers through the BitTorrent DHT. Connect directly with libp2p. Exchange data using any protocol. No servers. No accounts. No intermediaries in the data path.

BitTorrent DHT (BEP 44) libp2p Circuit Relay v2 DCUtR Hole Punching Noise Encryption

Every connection routes through someone else's infrastructure

Email routes through Google or Microsoft. Messaging apps depend on company backends. Even "decentralized" systems rely on specific relay networks controlled by a small group. The result: single points of failure, forced trust in operators, and vendor lock-in.

Three layers, all proven technology

NSA.tech composes battle-tested open protocols into a coherent infrastructure layer. Nothing here is new networking science — the innovation is in the composition.

Layer 01 — Discovery
Finding Peers
BitTorrent DHT · BEP 44 Mutable Items
Each peer publishes a signed entry to the BitTorrent DHT — the largest decentralized lookup system in existence, with over a million active nodes. Your public key is your address. Anyone who knows it can find your current connection metadata. Entries are ephemeral and refreshed periodically.
Layer 02 — Connectivity
Establishing Connections
libp2p Circuit Relay v2 · DCUtR · AutoNAT
Lightweight relay nodes facilitate a brief handshake (a few KB, under 2 minutes), then both peers simultaneously punch through their NATs to establish a direct connection. Research across 4.4M attempts shows ~70% success rate. Relays never carry user data — only signaling.
Layer 03 — Transport
Exchanging Data
Multiplexed Streams · Noise / TLS 1.3 · Protocol Agnostic
Once connected, peers communicate over end-to-end encrypted, multiplexed streams. Multiple protocols run concurrently over one connection — chat, file transfer, and streaming in parallel. Existing applications run their protocols directly over these streams. NSA.tech provides the pipe; what flows through it is up to you.

Decisions, not defaults

Zero Central Infrastructure
No servers store data or mediate connections. The DHT is distributed across millions of independent nodes. Relays are stateless and interchangeable.
Self-Sovereign Identity
Your identity is an ed25519 key pair generated locally. No registration, no accounts, no authority that can revoke your access.
Protocol Agnostic
The infrastructure handles discovery and connectivity. Once connected, peers multiplex different protocols over the same connection. Existing apps run directly on it.
Choose Your Trust
Run your own relay for zero third-party trust. Use community relays for convenience. Use a managed service for simplicity. Same protocol regardless.
No Store-and-Forward
The network does not persist data. If a peer is offline, they're unreachable. Like a phone call, not an answering machine. Users who want persistence run their own always-on node.
Zero Lock-In
Keys are portable. DHT entries are self-published. Switching providers means updating one DHT entry. Your peers don't even notice.

How it compares

Several projects explore parts of this design space. NSA.tech differentiates through the combination of zero central infrastructure, protocol agnosticism, and composability.

System Discovery Transport Data Layer
Briar Tor hidden services Tor / Bluetooth / WiFi Messaging only (Bramble)
Waku / Status libp2p DHT libp2p GossipSub + relays Messaging (Waku topics)
Nostr Relay URLs (manual) WebSockets to relays Social events (JSON)
NSA.tech BitTorrent DHT (BEP 44) libp2p direct + Circuit v2 Protocol agnostic

What can run on NSA.tech

Because the infrastructure is protocol-agnostic, it serves as a foundation layer for any application that needs direct peer-to-peer connectivity.

// messaging
Encrypted Messaging
Text, voice, video between peers with no server in the middle.
// transfer
File Transfer
Direct peer-to-peer file sharing. No size limits, no storage costs.
// iot
IoT Communication
Sensors and devices reachable by public key without exposing ports.
// collab
Collaborative Tools
Real-time document editing, whiteboarding, code collaboration.
// api
Decentralized APIs
Services discoverable and callable by public key rather than DNS.
// network
Private Networks
Ad-hoc encrypted networks between known peers. No VPN infra required.

Standing on giants

NSA.tech is not building new networking primitives. It composes proven, production-grade components into a coherent infrastructure layer.

Component Technology Track Record
Discovery BitTorrent DHT (BEP 44) 1M+ active nodes, 20+ years
Connectivity libp2p Circuit Relay v2 + DCUtR Powers IPFS, Ethereum, Filecoin
Transport libp2p multiplexed streams Battle-tested across major networks
Encryption Noise / TLS 1.3 Industry-standard authenticated encryption
NAT Traversal AutoNAT + DCUtR hole-punching ~70% success across 85K+ networks