Network Live / v0.8.1 / FIPS 203 · 204 · FN-DSA

As Dark
As It Gets.

Post-quantum anonymous overlay network. 3-hop onion routing with ML-KEM-768 + X25519 hybrid key exchange at every hop, ML-DSA-65 directory consensus, and Falcon-512 hidden-service addresses. Six pluggable transports. No OpenSSL. No liboqs. No compromises.

~55k
Lines of C
3
PQ Primitives
6
Transports
0
Downgrade Paths
~/moor ~ bootstrap

Post-quantum at every layer.

~55,000 lines of C core plus ~21,000 lines of vendored PQClean reference code. Minimal runtime deps: libsodium, libevent, zlib, pthreads. PQ primitives built in-tree — no OpenSSL, no GnuTLS, no liboqs.

K

ML-KEM-768 KEX

NIST FIPS 203 (formerly Kyber768, Level 3). Hybrid X25519 + ML-KEM-768 key exchange at link layer and at every circuit hop. Sequential-AND: both halves must succeed.

Post-Quantum
D

ML-DSA-65 Consensus

NIST FIPS 204 (formerly Dilithium3). Directory authorities co-sign the network consensus with Ed25519 + ML-DSA-65. Threshold signing; no single-DA compromise.

Post-Quantum
F

Falcon-512 Identity

NIST FN-DSA. Hidden-service descriptors dual-signed Ed25519 + Falcon-512. The .moor address commits to both the PQ KEM key and the Falcon key — no post-quantum identity forgery.

Post-Quantum
.

Hidden Services

Any TCP service exposed as a .moor address. 6-hop rendezvous circuits with vanguards. Any protocol: SSH, HTTP, IRC, databases, SMTP.

Privacy
?

XOR / DPF-PIR

2-server XOR-PIR and DPF-PIR descriptor lookups. The directory relay cannot learn which .moor address a client is resolving. On by default.

Privacy
6

Pluggable Transports

ShitStorm (Chrome JA4), Nether (Minecraft), Mirage (TLS 1.3), Shade (Elligator2), Scramble (HTTP), Speakeasy (SSH). Make MOOR look like anything else.

Censorship Resistance
~

WTF-PAD Padding

Per-circuit randomized adaptive padding. Fixed 514-byte cells. FRONT burst-cover padding. Constant-rate cover floor. Defeats website-fingerprinting.

Traffic Analysis
V

Vegas Congestion Control

Prop 324/329 per-circuit CC with authenticated SENDMEs (Prop 289). EWMA circuit scheduling. 128 pre-built circuits per client.

Performance
S

SKIPS Scheduler

Kernel-informed packet scheduling. RTT-adaptive tick interval. TCP_INFO write budgets. Congestion-aware EWMA boost. MOOR's KIST.

Performance
N

Noise_IK Link

1-RTT authenticated link handshake with mandatory PQ hybrid upgrade. Forward-secret. Sequential-AND verification — no classical-only fallback.

Post-Quantum
#

Argon2id PoW

Memory-hard proof-of-work admission control. 256 KB per hash. Epoch-bound salt. Defends HS intro points and relay admission against DoS.

DoS Protection

Pinned Vanguards

L2 vanguards rotate every 24h, L3 every 1h. Prevents guard-discovery attacks on hidden services. Prop 271 guard pinning at ≥20 relays.

Privacy

Conflux Multi-Path

Aggregate bandwidth across multiple circuit legs. EWMA-weighted scheduling with latency-aware path selection.

Performance

seccomp-bpf Sandbox

Linux syscall filtering. no_new_privs enforced. Relay and client processes drop privileges after startup. mlockall for key material.

Security

Path-Bias Detection

Statistical tracking of guard circuit success. Detects guards that selectively fail circuits to bias path re-selection.

Security

GeoIP Diversity

Country and AS-level exclusion prevents all-same-jurisdiction circuits. 370K+ IPv4 rows, 100K+ IPv6 rows. Enforced at path selection.

Privacy

OnionBalance

Distributed hidden-service load balancing across multiple backends. Transparent to clients. Scale HS throughput horizontally.

Performance

Build-ID Fleet Gate

Every build stamps the git commit into the binary. Directory authorities reject descriptors with a different build-ID. Fleet upgrades in lockstep — no silent version drift.

Security

Three hops. Six layers.

Every client connection traverses guard, middle, and exit relays. Each hop adds a fresh layer of hybrid encryption. Hidden-service circuits add 3 vanguard-protected hops for 6 total — no single relay ever sees both endpoints.

0
CLIENT
Your machine
Noise_IK + ML-KEM
1
GUARD
Knows your IP
PQ onion
2
MIDDLE
Knows nothing
PQ onion
3
EXIT / RP
Exit or rendezvous
Cleartext *
TARGET
* unless HS or HTTPS

Link Layer

Noise_IK + ML-KEM-768 · XChaCha20-Poly1305

1-RTT authenticated link handshake with mandatory PQ hybrid upgrade. Sequential-AND verification. 532-byte wire frames. No downgrade path.

Circuit Layer

X25519 + ML-KEM-768 · ChaCha20-Poly1305

Layered onion encryption, fresh hybrid key material per hop. Fixed 514-byte cells. BLAKE2b running digest authentication.

End-to-End (HS)

ML-KEM-768 sealed INTRODUCE1

Hidden-service rendezvous. PQ-sealed introduction cells. Client and HS derive e2e keys no relay ever sees. Any TCP protocol.

Descriptor Layer

Ed25519 + Falcon-512 · Blinded

Dual-signed HS descriptors. Blinded keys rotate per time period. DPF-PIR lookup. Signed revision counters defeat replay attacks.

Your address is your key.

A .moor address binds three keys into a single human-shareable string. It cannot be spoofed by a classical attacker and cannot be spoofed by a quantum attacker. The address IS the verification.

j2kcelaruabn6p7yctbxwqpeekfr3umcwtqqpegsx6gvkb73vd7x72dcnxl2ryq.moor
Ed25519 PubKey (32 B)

Classical identity. Cheap to verify, used for the outer descriptor signature. Half of a sequential-AND check.

BLAKE2b-16(ML-KEM ‖ Falcon)

16-byte commitment to ML-KEM-768 pubkey (1184 B) concatenated with Falcon-512 pubkey (897 B). The address proves the PQ material.

Checksum + Version

Base32-encoded footer covering checksum bytes and the version marker. Mistyped addresses fail fast — no silent mis-route.

Six ways to disappear.

When plain encryption isn't enough, make MOOR traffic look like something else entirely. All six transports ship in-tree and are selectable with a single flag.

ShitStorm
Recommended

Chrome 131+ JA4 fingerprint (X25519MLKEM768 keyshare). Elligator2 key-hiding. ECH GREASE. HTTP/2 framing. Key rotation every 65K records.

wire: TLS 1.3 ClientHello → HTTP/2 frames
Nether
Bridge

Minecraft 1.21.4 protocol camouflage. Real handshake, login sequence, plugin-channel framing. DPI sees Minecraft gameplay.

wire: Minecraft Protocol 767 login + play
Mirage
Bridge

TLS 1.3 framing with operator-configurable SNI. Looks like a connection to any domain you choose.

wire: TLS 1.3 w/ configurable SNI
Shade
Bridge

Elligator2 point obfuscation with inter-arrival time modes. Wire bytes are indistinguishable from uniform random.

wire: Uniform random bytes
Scramble
Bridge

ASCII HTTP prefix + ChaCha20 stream cipher. Passes casual DPI inspection as regular web traffic.

wire: GET / HTTP/1.1 → ChaCha20
Speakeasy
Bridge

SSH protocol camouflage with real banner exchange. Looks like an SSH session to any passive observer.

wire: SSH-2.0-OpenSSH banner + KEX

Running in 30 seconds.

One command to install. One command to run.

Quick Install Easiest

Detects your distro, installs build deps, builds from source, and starts a client (or relay with -s -- --role).

# Client (SOCKS5 on :9050) curl -sL https://raw.githubusercontent.com/0xdeadbeefnetwork/MOOR_PQ/main/setup.sh | sudo bash # Run a middle relay curl -sL .../setup.sh | sudo bash -s -- --role middle --nickname MYRELAY

Supports Debian/Ubuntu (apt), Fedora (dnf), Arch (pacman), and Alpine (apk). If system libsodium < 1.0.18, the script builds 1.0.20 from source.

Build from Source Control

Three libraries, a C compiler, and make. PQ primitives are vendored from PQClean — nothing to download separately.

sudo apt install build-essential libsodium-dev \ libevent-dev zlib1g-dev pkg-config git clone https://github.com/0xdeadbeefnetwork/MOOR_PQ cd MOOR_PQ && make # Client: ./moor -f moorrc # Browser: socks5h://127.0.0.1:9050

Hardening is automatic: -fstack-protector-strong, FORTIFY_SOURCE=2, -fPIE -pie, full RELRO. Every build stamps the git commit as a fleet-gate build ID.

Get MOOR.

Source only. Build it yourself. Verify it yourself.

v0.8.1
April 2026 · BSD 3-Clause
clone: git clone https://github.com/0xdeadbeefnetwork/MOOR_PQ
branch: main · deps: libsodium libevent zlib pthreads
"Privacy is not a privilege granted by the powerful.
It is a right exercised by the free."