Norrn
Secure Mesh Networking
Alpha 0.9.16Works with infrastructure. Works without infrastructure.
The Mesh
A self-healing, encrypted fabric across any transport.
Norrn automatically forms a secure mesh where peers discover each other,
establish links, and route messages—completely independent of central infrastructure.
Post-quantum security
True end-to-end encryption.
Every message is secured with post-quantum safe encryption using unique session keys.
With ephemeral key exchange and forward secrecy, your past communications remain
protected even if a future key is compromised.
Cryptographic routing
Trust only what can be proven.
Nodes use cryptographic identities to build verified routes. The network learns and
adapts as it grows; if a path or transport drops, the mesh automatically rebuilds
and delivers queued messages the moment a path returns.
Transport agnostic
Internet, LoRa, WiFi, Bluetooth—anything.
Norrn routes through whatever is available. The mesh bridges disparate
transports into a single, cohesive network, dynamically adapting to the paths it finds.
Pure Peer-to-peer
No central authority. No single point of failure.
Every node is equal. Relays exist for convenience, not control—the power remains
at the edge. You can host your own or use ours.
Routing
Mesh protocol where security is not optional.
Norrn uses cryptographically verified handshakes to establish secure Links — routing
is built from signed identities, not trusted servers. The mesh forms across internet,
radio, and local transports simultaneously.
1:1 Messaging
Automated, end-to-end encrypted links.
Peers announce themselves via cryptographic identities to establish encrypted links.
The network only trusts what it can prove; routes are built from
verified signatures, allowing the mesh to self-heal and deliver queued messages
the moment a path becomes available.
Group Messaging
Groups use a shared symmetric key instead of Links. When a group is created, a random key is generated and distributed to each member through their existing encrypted 1:1 Links — the key never travels unprotected. To send a group message, the sender encrypts once with the shared key and broadcasts the packet across the mesh. Every member holding that key can decrypt it; everyone else sees noise. Messages are signed with the sender's identity, so the group verifies who sent what. Key management — invites, rotations, member changes — flows through 1:1 Links, keeping the group key protected by the same encryption that secures direct messages.
Contact us for more information regarding security and encryption.Entities
They are all mesh clients, they access it in the same way. They provide different flavors of convenient functionality and provide transparency to other peers.
Peer — An application communicating on the mesh.
Relay — A peer with the only purpose is to give the functionality to store/forward. Non interactive, just dumb, our server is one such example, our LoRa Extender is another.
Norrns — On the edge agents, providing functionality on top of Norrn. Connects to Norrn on one side and runs your code on the other. We have our own Norrns set up Verdandi, Urd & Skade, providing you with AI.
Sensor — Autonomous sensors reporting with Norrn.
Want to use Norrn as your mesh?
Weather you are using Kotlin, Swift or Python, we got you covered! Get started with just a few lines of code. Vibe coding? No worries we got great documentation for AI as well!
val norrn = Norrn(
userId = myIdentity.id,
storage = myStorageCallback,
messageCallback = myMessageCallback
)
norrn.start()
// Add transports — use what you have
norrn.setQuic("relay.example.com:4433")
norrn.setLora(mySerialPort)
// Encryption and routing handled automatically
norrn.sendText(recipientId = "dc75a074...", text = "hello world!")
Support
Devices
- RAK4631/4630 [link to firmware]
- LillyGo T-beam 1.1 [link to firmware]
Operatingsystems
- MacOS/iOS
- Linux
- Android
- Windows
Contact
Have questions or want to collaborate? Get in touch.
Norrn Mesh Protocol
Links
Peers establish encrypted sessions called Links through a verified handshake. Once a Link is up, all messages flow through it — encrypted, lightweight, and persistent across restarts.
End-to-end encrypted
Every message is encrypted with ChaCha20-Poly1305 using keys unique to each session. Ephemeral key exchange ensures forward secrecy — past sessions stay safe even if a key is compromised.
Cryptographic routing
Peers announce themselves with Ed25519-signed identities. Routes are built from verified signatures — the network only trusts what it can prove.
Resilient mesh
Nodes discover each other automatically and learn routes as the network grows. Messages hop through neighbors toward their destination — if a peer or transport drops, routes rebuild and queued messages deliver when a path returns. The mesh is self-healing.
Transport agnostic
Internet, LoRa, WiFi Aware, Bluetooth — Norrn routes through whatever is available. The mesh bridges across transports, adapting to the paths it finds.
Peer-to-peer
No central authority. Every node is equal. Relays exist for convenience, not control — you can host your own or use ours.
Norrns
On the edge agents, providing functionality on top of Norrn. Connects to Norrn on one side and runs your code on the other. Detailed documentation coming soon.