Blog

Technical writing about cryptography, privacy, and the surveillance state we are building tools to resist.

RVNT Protocol: A Technical Deep Dive

A detailed walkthrough of the RVNT cryptographic protocol — hybrid X3DH key exchange with ML-KEM-768, the Double Ratchet with AES-256-GCM, sealed sender metadata protection, and Tor-based transport.

cryptographyprotocolpost-quantumtechnical
Read