Official Source Repository

The Bloom Protocol

A transport-agnostic, post-quantum secure mesh network protocol with polymorphic traffic obfuscation. Explore the code, read the research.

Six-Layer Protocol Stack

Bloom implements a layered architecture from transport abstraction through post-quantum cryptography, mesh routing, traffic morphing, and IRC-inspired application semantics.

Transport Agnostic

Operates over TCP, UDP, WebSocket, WebRTC, or pluggable transports. No single transport dependency.

Post-Quantum Secure

Hybrid ML-KEM + X25519 key exchange, ML-DSA signatures, and SLH-DSA for long-term identity protection.

Mesh Network

Kademlia DHT for peer discovery with direct, relay, multipath, and onion routing modes.

Traffic Morphing

Polymorphic obfuscation with five disguise modes, metamorphic mutation, and timing jitter to defeat DPI.

Location-Hidden Services

Greenhouse system provides .bloom addressing with introduction points, rendezvous circuits, and DHT descriptors.

IRC-Inspired Semantics

Gardens, channels, and capability negotiation provide familiar group communication primitives.

Whitepapers

Read the protocol specification, comparative analysis, and research roadmap.

Projects

Browse the complete source code of every component in the Bloom Protocol ecosystem.

Select a project
Select a project to browse its source code
Select a paper to read