Alpha software. Expect breaking changes, data loss, and rough edges. Nothing is stable yet.
Privacy notice: Proscenium connects peers directly over QUIC. It is NOT an anonymity network. Peers you communicate with can see your IP address.
A decentralized peer-to-peer social network built with Iroh, Tauri 2, and SvelteKit 5.
Successor to follow and identia, rebuilt on iroh's QUIC transport with end-to-end encrypted messaging.
Every user runs their own node. Posts, profiles, and follows are stored locally. Peers exchange data directly -- no central server, no accounts, no passwords. Optional discovery servers provide search, trending, and user directories without compromising the P2P foundation.
Iroh is a networking library that gives every node a persistent identity (an Ed25519 keypair) and connects peers directly over QUIC, punching through NATs with the help of relay servers. Peers discover each other via DNS, mDNS on local networks, and the Mainline DHT. Iroh provides two higher-level primitives on top of raw QUIC connections: iroh-gossip for real-time pub/sub broadcast, and iroh-blobs for content-addressed data transfer. Proscenium uses all of these -- gossip for live feed updates, blobs for media, and direct QUIC connections for DMs, calls, and stage audio.
Each node has a three-tier key hierarchy:
master_key.key. Your master public key is what others follow. The master key signs delegations and key rotations but never signs content directly. On first launch, a 24-word BIP39 recovery phrase is generated for backup.The master key signs a SigningKeyDelegation binding the signing key to the identity. Peers cache this delegation and verify content signatures against the signing key. This separation means a compromised device's signing key can be rotated without losing the permanent identity.
Six protocol layers handle all communication:
proscenium/call/1). Audio is captured via cpal, encoded with Opus at 48kHz mono in 20ms frames, and streamed over bidirectional QUIC streams with length-prefixed framing. Call signaling (ring, accept, reject, end) is encrypted via the DM ratchet session.proscenium/stage/1). A host creates a room and speakers stream audio to the host via QUIC unidirectional streams. The host decodes all speaker streams, mixes them, re-encodes as a single Opus stream, and fans it out to listeners. Speakers receive individual forwarded streams from the host in an SFU model (no mesh). Volunteer relays extend capacity by forwarding the mixed stream to additional listeners. Stream authentication uses SHA256 hash chains with Ed25519 checkpoint signatures.When following a new user, an IdentityRequest is sent to their transport NodeId. The response contains their master pubkey, user key delegation, and profile. This is cached locally so subsequent connections can resolve the master pubkey to reachable transport NodeIds.
All data is persisted in a local SQLite database. The app works offline and syncs when peers are available.
Backend state model: Services (GossipService, DmHandler, CallHandler, StageHandler, PeerHandler) are self-managing actors behind Arc with internal command channels. The Iroh endpoint, blob store, and database are accessed lock-free. A TaskManager tracks all background tasks for structured shutdown.
The system tray icon requires libayatana-appindicator. GNOME does not display tray icons by default -- you need the AppIndicator extension:
# Arch
pacman -S gnome-shell-extension-appindicator
# Ubuntu/Debian
apt install gnome-shell-extension-appindicator
# Fedora
dnf install gnome-shell-extension-appindicator
Enable and restart your session:
gnome-extensions enable [email protected]
# Log out and back in
npm install
npm run tauri dev
This starts both the Vite dev server (port 1420) and the Tauri backend.
npm run tauri build
Produces a native desktop application in src-tauri/target/release/.
rustup target add aarch64-linux-android armv7-linux-androideabi x86_64-linux-android i686-linux-android
export ANDROID_HOME="$HOME/Android/Sdk"
export NDK_HOME="$ANDROID_HOME/ndk/<version>"
Run on a connected device or emulator:
npm run tauri android dev
To view logs:
adb logcat -s proscenium
Use a broader filter if needed (the tag may vary):
adb logcat | grep -i proscenium
npm run tauri android build
The APK/AAB is output to src-tauri/gen/android/app/build/outputs/.
tauri-plugin-log which routes to Android logcat automaticallyendpoint.network_change() every 30 seconds to keep connectivity alivetauri-plugin-barcode-scanner which requires the CAMERA permission (declared in the manifest)proscenium:// schemeA self-hosted, headless server binary (server/) that adds opt-in aggregation, search, and trending to the P2P network. Users register with a server by signing a cryptographic proof of identity. The server subscribes to their gossip topics and indexes their posts in SQLite with FTS5, exposing an HTTP API for search, trending hashtags, user directory, and aggregated feeds.
The server is an overlay -- the P2P layer remains the foundation. Users who never connect to a server lose nothing.
cargo build --release --manifest-path server/Cargo.toml
./server/target/release/proscenium-server
The server listens on port 3000 by default. Configuration is via environment variables (PROSCENIUM_PORT, PROSCENIUM_DB_PATH).
A deploy script is provided for uploading to a remote server:
scripts/deploy-server.sh
This builds a static musl binary, uploads it via scp, and restarts the systemd service.
GET /api/v1/info -- Server info (name, version, user/post counts)POST /api/v1/register -- Register with signed cryptographic proofDELETE /api/v1/register -- UnregisterGET /api/v1/feed -- Aggregated post feedGET /api/v1/trending -- Trending hashtagsGET /api/v1/users -- User directoryGET /api/v1/users/search?q= -- Search usersGET /api/v1/users/{pubkey}/devices -- Transport NodeIds for a user's devicesGET /api/v1/posts/search?q= -- Full-text post searchUsers choose a visibility level when registering:
See todos/community-server.md for the full design document.
End-to-end encrypted direct messaging over a custom QUIC protocol (proscenium/dm/1). Messages are encrypted such that only the two participants can read them -- not relay servers, not discovery servers, not anyone.
Encryption is a two-phase process: a one-time session establishment, then per-message encryption with forward secrecy.
Phase 1: Noise IK Handshake (Session Establishment)
Each user has an X25519 DM key derived from their master key via HKDF. When Alice first messages Bob, a Noise_IK_25519_ChaChaPoly_BLAKE2s handshake is performed over a dedicated QUIC bi-directional stream:
DmHandshake::Init containing the Noise message and her DM public keyDmHandshake::ResponseThe "IK" pattern means the initiator knows the responder's long-term public key in advance, and the initiator's long-term key is encrypted and authenticated to the responder in the first message -- both sides are mutually authenticated.
Phase 2: Double Ratchet (Ongoing Messages)
The Noise shared secret seeds a Double Ratchet (Signal Protocol pattern):
HKDF-SHA256(root_key, dh_output, info="proscenium-dm-rk") derives a new root key and chain key (64 bytes, split in half)HKDF-SHA256(chain_key, info="proscenium-dm-ck-msg") derives a one-time message key; HKDF-SHA256(chain_key, info="proscenium-dm-ck-chain") derives the next chain keyEach encrypted message carries a ratchet header: the sender's current DH public key, message number, and previous chain length. This allows the receiver to perform DH ratchet steps and handle out-of-order delivery (up to 100 skipped messages).
At-Rest Encryption
Ratchet session state is stored in SQLite encrypted with ChaCha20-Poly1305. The storage key is derived via HKDF-SHA256(dm_secret_key, info="proscenium-ratchet-storage-v1"). Format: base64(12-byte random nonce || ciphertext).
Messages are serialized as JSON over QUIC bi-directional streams. An encrypted envelope contains:
sender: hex-encoded X25519 DM public key
ratchet_header: { dh_public, message_number, previous_chain_length }
ciphertext: ChaCha20-Poly1305 encrypted payload
The encrypted payload (DmPayload) can be: Message (text + media), Delivered, Read, Typing, CallOffer, CallAnswer, CallReject, or CallHangup. All payload types use the same ratchet channel, so call signaling is also end-to-end encrypted.
Messages are sent directly peer-to-peer with no intermediary. If the recipient is offline, the pre-encrypted envelope is queued to a local outbox. A background task retries delivery every 15 seconds, with an immediate retry on Notify when new messages are queued. Successfully delivered messages receive a DmAck response over the QUIC stream, triggering a dm-delivered event to the frontend.
See todos/direct-messaging.md for the original design document.
Peer-to-peer 1:1 voice calls over a dedicated QUIC protocol (proscenium/call/1). Call signaling (ring, accept, reject, end) is encrypted via the DM ratchet session.
See todos/voice-video-calling.md for the design document.
Multi-participant live audio rooms built on a dedicated QUIC protocol (proscenium/stage/1). Rooms support roles (Host, Co-host, Speaker, Listener) with a host-centric SFU audio architecture.
See docs/spaces-design.md for the full design document.
Link multiple devices (phone, desktop, tablet) to a single identity. The three-tier key hierarchy (master / signing / transport) is implemented: a master key is the permanent identity, a derived signing key handles content signing and DM encryption across all devices, and per-device transport keys provide unique iroh NodeIds. The master key enables secure signing key rotation if a device is compromised without losing the identity.
Key hierarchy, identity resolution, delegation, device pairing, and cross-device data sync are implemented. Remaining work covers key rotation and revocation.
See todos/linked-devices.md for the full design document.
VS Code + Svelte + Tauri + rust-analyzer.
MIT