Not only a Network, made of software, also a hardware Kit! Resilient, sustainable, portable to survive and connect everywere!
You can make it yourself or support oasis-project and buy it here
OASIS runs directly on your Linux system. When started, it launches your browser into a locally hosted node interface.
Hack the planet
The entire user interface is based on Markdown rendering, making it one of the most auditable, minimal and secure UIs.
Each user replicates content they support. If your node is lost, you can recover your content through trusted peers.
Messages are signed using Ed25519. Every post, connection or interaction is verifiable and immutable.
HACK THE PLANET
Based on append-only logs, where each peer maintains a personal chain of messages replicated via trust.
Scuttlebut was released in 2017 and presented in the CCC
Data propagates peer-to-peer through the Gossip protocol, ensuring high fault-tolerance and antifragility.
Extendable via plugins such as torrents, WebRTC video calls, PDF renderers and more. All using secure JavaScript modules.
There is no search engine to find every user, you can only view the habitants you support
PUBs act as community mirrors with HTTPS frontends, making content accessible from the clearnet while preserving protoco>
Each PUB is a sovereign node. Federation exists only as a convenience layer, not a point of control.
Replicability enabled by blockchain ensures that once data is recorded, it remains consistent and available across all nodes, making tampering virtually impossible.
Replicability enabled by blockchain ensures that once data is recorded, it remains consistent and available across all nodes, making tampering virtually impossible.
Requirement | ![]() |
SVPN | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
---|---|---|---|---|---|---|---|---|---|---|
Link Encryption | ✓ | ⊕ | ⊕ | ⊕ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Forward Secrecy | ⊝ | ⊝ | ⊙ | ⊝ | ⊕ | ✓ | ⊝ | ✓ | ✓ | ⊕ |
E2E Encryption | –– | ✗ | ⊙ | –– | –– | ✓ | ✓ | ✓ | ⊙ | ✓ |
No Strangers | –– | ✗ | ✗ | ✗ | ✖ | –– | ✓ | ✓ | ✓ | ✓ |
Secret Friends | –– | –– | ⊕ | –– | ✖ | –– | ✗ | ✓ | ✓ | ⊕ |
Untraceability | –– | –– | –– | –– | ✖ | ⊕ | –– | ⊕ | ⊕ | ⊕ |
Unobservability | –– | –– | ⊙ | –– | ✖ | ⊕ | –– | ⊕ | ✓ | ✓ |
Post Deniability | ✗ | –– | –– | –– | ✗ | ✗ | ✗ | ⊝ | ⊙ | ⊙ |
Lightweight | ✓ | ✓ | ⊙ | –– | ✓ | ✗ | ⊝ | ⊕ | ✗ | ⊕ |
Group Encryption | –– | ✗ | –– | –– | ✗ | ✗ | ✓ | ✓ | ⊙ | ⊕ |
Distribution | ✓ | ✗ | –– | –– | –– | ⊕ | ⊕ | ⊕ | ⊕ | ⊕ |
Relay Backbone | ✓ | ⊝ | ⊝ | ⊝ | ⊕ | ✓ | ⊝ | ⊝ | ⊝ | ⊕ |
Usability | ⊕ | ✗ | ⊙ | ⊕ | ⊕ | ✓ | ✗ | ✗ | ⊙ | ⊝ |
Features | ✓ | ✓ | ✗ | ✓ | ✓ | ⊕ | ⊝ | ⊝ | ⊝ | ⊝ |