Alpha software. Expect breaking changes, data loss, and rough edges. Nothing is stable yet.
A decentralized peer-to-peer social network built with Iroh, Tauri 2, and SvelteKit 5.
Successor to follow and identia, rebuilt on iroh's QUIC transport with end-to-end encrypted messaging.
Every user runs their own node. Posts, profiles, and follows are stored locally. Peers exchange data directly -- no central server, no accounts, no passwords. Optional discovery servers provide search, trending, and user directories without compromising the P2P foundation.
Iroh is a networking library that gives every node a persistent identity (an Ed25519 keypair) and connects peers directly over QUIC, punching through NATs with the help of relay servers. Peers discover each other via DNS, mDNS on local networks, and the Mainline DHT. Iroh provides two higher-level primitives on top of raw QUIC connections: iroh-gossip for real-time pub/sub broadcast, and iroh-blobs for content-addressed data transfer. Proscenium uses all of these -- gossip for live feed updates, blobs for media, and direct QUIC connections for DMs, calls, and stage audio.
Each node has a three-tier key hierarchy:
master_key.key. Your master public key is what others follow. The master key signs delegations and key rotations but never signs content directly. On first launch, a 24-word BIP39 recovery phrase is generated for backup.The master key signs a SigningKeyDelegation binding the signing key to the identity. Peers cache this delegation and verify content signatures against the signing key. This separation means a compromised device's signing key can be rotated without losing the permanent identity.
Six protocol layers handle all communication:
proscenium/call/1). Audio is captured via cpal, encoded with Opus at 48kHz mono in 20ms frames, and streamed over bidirectional QUIC streams with length-prefixed framing. Call signaling (ring, accept, reject, end) is encrypted via the DM ratchet session.proscenium/stage/1). A host creates a room and speakers stream audio to the host via QUIC unidirectional streams. The host decodes all speaker streams, mixes them, re-encodes as a single Opus stream, and fans it out to listeners. Speakers receive individual forwarded streams from the host in an SFU model (no mesh). Volunteer relays extend capacity by forwarding the mixed stream to additional listeners. Stream authentication uses SHA256 hash chains with Ed25519 checkpoint signatures.When following a new user, an IdentityRequest is sent to their transport NodeId. The response contains their master pubkey, user key delegation, and profile. This is cached locally so subsequent connections can resolve the master pubkey to reachable transport NodeIds.
All data is persisted in a local SQLite database. The app works offline and syncs when peers are available.
Backend state model: Services (GossipService, DmHandler, CallHandler, StageHandler, PeerHandler) are self-managing actors behind Arc with internal command channels. The Iroh endpoint, blob store, and database are accessed lock-free. A TaskManager tracks all background tasks for structured shutdown.
npm install
npm run tauri dev
This starts both the Vite dev server (port 1420) and the Tauri backend.
npm run tauri build
Produces a native desktop application in src-tauri/target/release/.
rustup target add aarch64-linux-android armv7-linux-androideabi x86_64-linux-android i686-linux-android
export ANDROID_HOME="$HOME/Android/Sdk"
export NDK_HOME="$ANDROID_HOME/ndk/<version>"
Run on a connected device or emulator:
npm run tauri android dev
To view logs:
adb logcat -s proscenium
Use a broader filter if needed (the tag may vary):
adb logcat | grep -i proscenium
npm run tauri android build
The APK/AAB is output to src-tauri/gen/android/app/build/outputs/.
tauri-plugin-log which routes to Android logcat automaticallyendpoint.network_change() every 30 seconds to keep connectivity alivetauri-plugin-barcode-scanner which requires the CAMERA permission (declared in the manifest)proscenium:// schemeA self-hosted, headless server binary (server/) that adds opt-in aggregation, search, and trending to the P2P network. Users register with a server by signing a cryptographic proof of identity. The server subscribes to their gossip topics and indexes their posts in SQLite with FTS5, exposing an HTTP API for search, trending hashtags, user directory, and aggregated feeds.
The server is an overlay -- the P2P layer remains the foundation. Users who never connect to a server lose nothing.
cargo build --release --manifest-path server/Cargo.toml
./server/target/release/proscenium-server
The server listens on port 3000 by default. Configuration is via environment variables (PROSCENIUM_PORT, PROSCENIUM_DB_PATH).
A deploy script is provided for uploading to a remote server:
scripts/deploy-server.sh
This builds a static musl binary, uploads it via scp, and restarts the systemd service.
GET /api/v1/info -- Server info (name, version, user/post counts)POST /api/v1/register -- Register with signed cryptographic proofDELETE /api/v1/register -- UnregisterGET /api/v1/feed -- Aggregated post feedGET /api/v1/trending -- Trending hashtagsGET /api/v1/users -- User directoryGET /api/v1/users/search?q= -- Search usersGET /api/v1/users/{pubkey}/devices -- Transport NodeIds for a user's devicesGET /api/v1/posts/search?q= -- Full-text post searchUsers choose a visibility level when registering:
See todos/community-server.md for the full design document.
End-to-end encrypted direct messaging over a custom QUIC protocol (proscenium/dm/1). E2E encryption uses X25519 key exchange derived from each user's existing ed25519 identity, with a Noise IK handshake for session establishment and a Double Ratchet for per-message forward secrecy. Messages are encrypted such that only the two participants can read them -- not relay servers, not discovery servers, not anyone.
See todos/direct-messaging.md for the original design document.
Peer-to-peer 1:1 voice calls over a dedicated QUIC protocol (proscenium/call/1). Call signaling (ring, accept, reject, end) is encrypted via the DM ratchet session.
See todos/voice-video-calling.md for the design document.
Multi-participant live audio rooms built on a dedicated QUIC protocol (proscenium/stage/1). Rooms support roles (Host, Co-host, Speaker, Listener) with a host-centric SFU audio architecture.
See docs/spaces-design.md for the full design document.
Link multiple devices (phone, desktop, tablet) to a single identity. The three-tier key hierarchy (master / signing / transport) is implemented: a master key is the permanent identity, a derived signing key handles content signing and DM encryption across all devices, and per-device transport keys provide unique iroh NodeIds. The master key enables secure signing key rotation if a device is compromised without losing the identity.
Key hierarchy, identity resolution, delegation, device pairing, and cross-device data sync are implemented. Remaining work covers key rotation and revocation.
See todos/linked-devices.md for the full design document.
VS Code + Svelte + Tauri + rust-analyzer.
MIT