The Bloom Protocol
A transport-agnostic, post-quantum secure mesh network protocol with polymorphic traffic obfuscation. Explore the code, read the research.
Six-Layer Protocol Stack
Bloom implements a layered architecture from transport abstraction through post-quantum cryptography, mesh routing, traffic morphing, and IRC-inspired application semantics.
Transport Agnostic
Operates over TCP, UDP, WebSocket, WebRTC, or pluggable transports. No single transport dependency.
Post-Quantum Secure
Hybrid ML-KEM + X25519 key exchange, ML-DSA signatures, and SLH-DSA for long-term identity protection.
Mesh Network
Kademlia DHT for peer discovery with direct, relay, multipath, and onion routing modes.
Traffic Morphing
Polymorphic obfuscation with five disguise modes, metamorphic mutation, and timing jitter to defeat DPI.
Location-Hidden Services
Greenhouse system provides .bloom addressing with introduction points, rendezvous circuits, and DHT descriptors.
IRC-Inspired Semantics
Gardens, channels, and capability negotiation provide familiar group communication primitives.
Whitepapers
Read the protocol specification, comparative analysis, and research roadmap.
Projects
Browse the complete source code of every component in the Bloom Protocol ecosystem.