Secure Mesh Networking
Alpha 0.9.16Works with infrastructure. Works without infrastructure.
A self-healing, encrypted fabric across any transport.
Norrn automatically forms a secure mesh where peers discover each other,
establish links, and route messages—completely independent of central infrastructure.
True end-to-end encryption.
Every message is secured with post-quantum safe encryption using unique session keys.
With ephemeral key exchange and forward secrecy, your past communications remain
protected even if a future key is compromised.
Trust only what can be proven.
Nodes use cryptographic identities to build verified routes. The network learns and
adapts as it grows; if a path or transport drops, the mesh automatically rebuilds
and delivers queued messages the moment a path returns.
Internet, LoRa, WiFi, Bluetooth—anything.
Norrn routes through whatever is available. The mesh bridges disparate
transports into a single, cohesive network, dynamically adapting to the paths it finds.
No central authority. No single point of failure.
Every node is equal. Relays exist for convenience, not control—the power remains
at the edge. You can host your own or use ours.
Mesh protocol where security is not optional.
Norrn uses cryptographically verified handshakes to establish secure Links — routing
is built from signed identities, not trusted servers. The mesh forms across internet,
radio, and local transports simultaneously.
Automated, end-to-end encrypted links.
Peers announce themselves via cryptographic identities to establish encrypted links.
The network only trusts what it can prove; routes are built from
verified signatures, allowing the mesh to self-heal and deliver queued messages
the moment a path becomes available.
Groups use a shared symmetric key instead of Links. When a group is created, a random key is generated and distributed to each member through their existing encrypted 1:1 Links — the key never travels unprotected. To send a group message, the sender encrypts once with the shared key and broadcasts the packet across the mesh. Every member holding that key can decrypt it; everyone else sees noise. Messages are signed with the sender's identity, so the group verifies who sent what. Key management — invites, rotations, member changes — flows through 1:1 Links, keeping the group key protected by the same encryption that secures direct messages.
Contact us for more information regarding security and encryption.They are all mesh clients, they access it in the same way. They provide different flavors of convenient functionality and provide transparency to other peers.
Peer — An application communicating on the mesh.
Relay — A peer with the only purpose is to give the functionality to store/forward. Non interactive, just dumb, our server is one such example, our LoRa Extender is another.
Norrns — On the edge agents, providing functionality on top of Norrn. Connects to Norrn on one side and runs your code on the other. We have our own Norrns set up Verdandi, Urd & Skade, providing you with AI.
Sensor — Autonomous sensors reporting with Norrn.
Weather you are using Kotlin, Swift or Python, we got you covered! Get started with just a few lines of code. Vibe coding? No worries we got great documentation for AI as well!
val norrn = Norrn(
userId = myIdentity.id,
storage = myStorageCallback,
messageCallback = myMessageCallback
)
norrn.start()
// Add transports — use what you have
norrn.setQuic("relay.example.com:4433")
norrn.setLora(mySerialPort)
// Encryption and routing handled automatically
norrn.sendText(recipientId = "dc75a074...", text = "hello world!")
Have questions or want to collaborate? Get in touch.
Peers establish encrypted sessions called Links through a verified handshake. Once a Link is up, all messages flow through it — encrypted, lightweight, and persistent across restarts.
Every message is encrypted with ChaCha20-Poly1305 using keys unique to each session. Ephemeral key exchange ensures forward secrecy — past sessions stay safe even if a key is compromised.
Peers announce themselves with Ed25519-signed identities. Routes are built from verified signatures — the network only trusts what it can prove.
Nodes discover each other automatically and learn routes as the network grows. Messages hop through neighbors toward their destination — if a peer or transport drops, routes rebuild and queued messages deliver when a path returns. The mesh is self-healing.
Internet, LoRa, WiFi Aware, Bluetooth — Norrn routes through whatever is available. The mesh bridges across transports, adapting to the paths it finds.
No central authority. Every node is equal. Relays exist for convenience, not control — you can host your own or use ours.
On the edge agents, providing functionality on top of Norrn. Connects to Norrn on one side and runs your code on the other. Detailed documentation coming soon.