Reference Implementations

Connect's architecture is a deliberate synthesis. Rather than starting from scratch, it adopts proven primitives from three existing systems — Briar, Secure Scuttlebutt (SSB), and SimpleX Chat — and extends them where no prior art exists. This page maps each Connect subsystem to its reference project, specifies what is taken directly, what is adapted, and what gap forced entirely new design.

The headline finding: no single existing project satisfies all seven Connect principles. The synthesis is necessary, not a preference. Briar provides physical-first trust and offline transport. SSB provides the append-only feed data model. SimpleX proves that identity-less messaging is viable in production. Everything else — per-audience encryption, MLS group encryption, post-quantum key exchange, passive BLE discovery — is novel to Connect.

The Seven Principles and Their Sources

Principle Reference Gap filled by Connect
Physical-first trust Briar (QR-enforced contact exchange) Adds NFC tap; adds passive BLE discovery post-trust
Proximity discovery None — new Rotating unlinkable BLE beacons; "someone nearby" UX without identity leak
Optional online Briar (Tor transport) Tor re-used; IPFS dropped in favour of direct Tor onion
No single surveillance point Briar (no servers), SimpleX (no global ID) Combines both; adds encrypted feed so even relays see only ciphertext
Structural privacy SimpleX (queue model), Briar (no servers) Extends to the feed layer; adds Tor for online mode
Anonymity by default SimpleX (no user IDs), SSB (keypair identity, no PII) Hybrid: keypair for feed signing, per-contact queues for messaging
Offline-only viability Briar (BLE + WiFi + Tor) Adds NFC; passive BLE; WiFi Direct; iOS path via relay

Trust Establishment — Reference: Briar

Briar's QR-enforced in-person contact exchange is the closest existing implementation of physical-first trust. The mechanism is simple: both users open the app simultaneously, one displays a QR code, the other scans it, and a mutual key exchange is stored locally with no server record.

What Connect takes:

What Connect adapts:

What Briar does not provide:

Offline Transport — Reference: Briar / Bramble

Bramble (Briar's transport layer) is the most directly reusable reference in Connect's design. It provides:

Bramble sub-protocol What it does Connect equivalent
Bramble Transport Pluggable transport abstraction (BLE, WiFi, Tor, storage) Connect's NFC → BLE → WiFi Direct → Tor layered stack
Bramble Synchronization Delay-tolerant store-and-forward sync over any transport BLE 4-message SyncRequest/Offer/Chunk/Ack handshake
Bramble Handshake Authenticated key agreement X3DH + PQXDH over NFC/QR
Bramble Rendezvous Contact finding over Tor without leaking identity to the rendezvous point Tor .onion address, encrypted and shared only with the specific contact

What Connect takes:

What Connect does not take:

What Briar does not provide (new in Connect):

Social Feed Data Model — Reference: SSB

SSB's append-only hash-chained feed is the direct ancestor of Connect's encrypted feed. The structural similarity is deliberate:

SSB feed entry:
{
  author: "@<public_key>.ed25519",
  sequence: n,
  previous: "<hash of entry n-1>",
  content: { type: "post", text: "..." },   // PLAINTEXT
  signature: "<ed25519 sig>"
}

Connect envelope:
{
  version: 1,
  feed_id: "<SHA-256(identity_key.pub)>",
  sequence: n,
  previous: "<SHA-256(prev_envelope)>",
  type: "post",
  audience: "contacts",
  content_enc: "<AEAD-encrypted content>",  // ENCRYPTED
  signature: "<ed25519 sig>"
}

What Connect takes from SSB:

Where Connect departs from SSB:

Property SSB Connect
Content Plaintext JSON AEAD encrypted per audience
Replication Friends-of-friends gossip (default 2 hops) Direct contacts only
Social graph Public to all replicating peers Local only; never gossiped
Private messages Bolt-on (box2, per-recipient map) Native Double Ratchet (DM) + MLS (groups)
Forward secrecy None Double Ratchet (DM) + MLS epoch ratchet (groups)
Post-quantum None Hybrid X25519 + ML-KEM-768
Transport TCP / WebSocket / Pubs BLE / WiFi Direct / optional Tor

The single most important departure: Connect's content is never plaintext to relaying nodes. A relay or any intermediate BLE peer sees only ciphertext. This closes SSB's largest privacy failure — that pub servers and gossip peers can read all feed content. See Feed Format Spec for the full wire specification.

Metadata Protection — Reference: SimpleX Chat

SimpleX Chat proves that identity-less messaging is achievable in production. Its queue model is the reference for Connect's 1-to-1 metadata protection:

SimpleX contact model:
  Alice → queue Q_A→B (known only to Alice and Bob) → Bob
  Bob   → queue Q_B→A (known only to Bob and Alice) → Alice
  Server sees: opaque queue IDs. No user accounts. No link between the two queues.

What Connect takes from SimpleX:

What Connect adapts:

What SimpleX does not provide:

Group Encryption — Reference: MLS (RFC 9420)

None of Briar, SSB, or SimpleX provides a satisfactory group encryption primitive for Connect's use case. Briar has no groups. SSB has no private groups in the base protocol. SimpleX groups use a star topology (one owner re-encrypts to each member) with no forward secrecy.

Connect uses MLS (RFC 9420), the IETF standard, for all group messaging:

The "adding a member requires an existing member's commit" MLS rule maps naturally to physical-first trust: joining a group requires an existing member who physically knows the new person. See Encryption & Privacy for the full cryptographic model.

Post-Quantum Key Exchange — Reference: Signal Protocol (PQXDH)

Signal's PQXDH (post-quantum X3DH) is the direct reference: it combines X25519 classical DH with ML-KEM-768 (Kyber) in a hybrid construction that is secure as long as either primitive holds. Connect adopts this exactly, mapping the bootstrap from Signal's server-mediated prekey bundle to Connect's in-person NFC/QR exchange — which is more secure because there is no server-side MITM window at bootstrap.

Signal's October 2025 "Triple Ratchet" (SPQR), which adds a post-quantum ratchet on top of the Double Ratchet, is tracked as a future upgrade path.

What No Existing Project Provides

These Connect design elements have no reference implementation — they are genuinely new:

Element Closest prior art Gap
Passive unlinkable BLE discovery for known contacts None — Briar requires deliberate QR scan Rotating-beacon recognition from a shared contact key is a fresh design
Per-audience AEAD on an append-only log SSB box2 (bolt-on, plaintext outer) Connect's audience field + AEAD per key schedule is new
NFC as a full key-exchange transport Android Beam (deprecated), HCE (one-way only) NDEF payload carrying a PQ key bundle + queue descriptors is new
Three-tier offline key revocation PGP revocation certs (server-based), Signal (phone number) Store-carry-forward gossip + Shamir 2-of-3 + guardian threshold is new
iOS proximity at parity with Android Berty/Wesh (partial) No existing app has solved the CoreBluetooth background + overflow-area problem cross-platform

For a full comparison matrix of all eight evaluated protocols, see Existing Protocols.

Open Questions