Own PQS encryption
- Architecture: Pure P2P - no servers, no databases
- Key storage: Keys generated in memory, never stored, erased after use
- Metadata: Only IP and port exist during the session - everything else is encrypted & obfuscated
- Encryption: PQS v1.2 - PBKDF2-HMAC-SHA256 (200k), BLAKE2s-MAC, custom stream cipher + fake padding
- Authentication: BLAKE2s-MAC (16 bytes) - instant failure on any data change
- Packet obfuscation: --stealth mode - padding, hidden structures
- Connection: Direct peer-to-peer only
- Anonymity: No accounts, logins, or phone numbers
- Third-party access: Impossible without physical access to both peers during session
- History: No storage — all in RAM, wiped on close
- Message size: Limited only by RAM & MTU — no artificial limits
- External dependencies: None
- DPI/blocking resistance: Harder to detect, can be masked
- Autonomy: Fully offline until peers connect
Listening for incoming connection (Server mode)
-
python3 pqs_chat.py --listen 0.0.0.0:0000 --password --nick --stealth
-
--listen IP:port - Bind to specified IP and port to accept connection
-
--password - Shared session password (PQS key derivation)
-
--nick - Local nickname shown in chat
-
--stealth - Enable packet obfuscation and structure hiding
Connecting to a peer (Client mode) python3 pqs_chat.py --connect 0.0.0.0:0000 --password --nick --stealth
- --connect IP:port - Bind to specified IP and port to accept connection
- --password - Shared session password (PQS key derivation)
- --nick - Local nickname shown in chat
- --stealth - Enable packet obfuscation and structure hiding
Example:
- Server mode: python3 pqs_chat.py --listen 0.0.0.0:7777 --password Test12345 --nick Ivan --stealth
- Client mode: python3 pqs_chat.py --connect 111.222.33.44:7777 --password Test12345 --nick John --stealth
Licensed under the Petoron P2P Messenger Fair Use License by Ivan Alekseev | Petoron