ISOTOPE uses a defense-in-depth "hybrid" model to protect against Store-Now-Decrypt-Later (SNDL) attacks.
- Layer 1 (Classic):
Noise_XX_25519_ChaChaPoly_BLAKE2b(Authenticated Key Exchange). - Layer 2 (Post-Quantum):
Kyber-1024Key Encapsulation Mechanism (NIST PQC Winner). - Key Rotation: Session keys rotate every 100 messages or 5 minutes (Double Ratchet inspired).
- A2: Dead Man's Switch:
- Automatic data wiping after 5 minutes of inactivity.
- Triggers MAYDAY Protocol: Broadcasts a silent distress signal to all peers before destruction.
- A3: Hidden Volumes (TrueCrypt-style):
- Outer Password: Unlocks "decoy" data partition.
- Inner Password: Unlocks "real" high-security partition.
- Mathematically impossible to prove the inner volume exists.
- T1: Cover Traffic:
- Sends constant-rate dummy packets every 2-8 seconds to mask message timing.
- T2: Multi-Hop Onion Routing:
- Chains multiple SOCKS5 proxies for defense-in-depth anonymity.
- C3: Deniable Authentication:
- Uses Ring Signatures to authenticate group membership without revealing identity.
- D1: Anomaly Detection:
- Behavioral profiling (typing speed, session times) detects if an account is compromised.
- Secure Memory: All sensitive keys and buffers are zeroized (overwritten) on drop.
- Panic Switch:
Ctrl+Xor/nukeinstantly wipes keys, deletes the identity file, and shreds local data.
ISOTOPE v4.0.0 features a professional-grade Terminal User Interface (TUI) with a modular tabbed layout.
| Key | Action |
|---|---|
Tab |
Cycle Panel Focus (Input -> Chat -> Operatives) |
Alt+Right |
Next Tab (COMMS -> VAULT -> INTEL) |
Alt+Left |
Previous Tab |
? |
Toggle Help Overlay |
Esc |
Cancel / Close Modals |
The main workspace for secure communication.
- Chat Window: Syntax-highlighted messages. Code blocks are automatically formatted.
- Input: Type
/to see available commands. - Operative List: Real-time visibility of online peers.
Real-time operational metrics for situational awareness.
- Network Graphs: Live upload/download traffic visualization (Sparklines).
- Status Panel:
- CIPHER:
KYBER-1024(Green = Secure). - IDENTITY:
Ghost @ Ops(Shows current persona). - UPTIME: Session duration.
- RAM: Secure memory usage.
- CIPHER:
-
Tor Service (Port 9050)
- Linux:
sudo apt install tor && sudo systemctl start tor
- Linux:
-
Rust Toolchain
-
Windows Prerequisites
- If you are using it in windows you must install tor services on your system
Steps are given below
- If you are using it in windows you must install tor services on your system
Install the tor service on Windows
- Install tor expert bunder from here Tor Expert Bundle
- Then extract the bundle using
tar -xzf tor-expert-bundle-windows-x86_64-15.0.4.tar.gz - Then move the extracted tor directory to
C:\tor - Then create a
torrcfile and add these lines into the fileMake sure you don't forget to create the data directorySocksPort 9050 ControlPort 9051 CookieAuthentication 1 DataDirectory C:\Tor\data
- Then run this command on tor directory
tor.exe -f torrcand wait till it reachesBootstrap (100) Done - Verify the tor connection
curl --socks5-hostname 127.0.0.1:9050 https://check.torproject.org(Optional)
Note: If you don't want to build from source you can download the executables for Windows and linux here release
git clone https://github.com/id-root/isotope.git
cd isotope
cargo build --releaseLocation: ./target/release/isotope
./isotope server --port 7878 --identity server.id- Share the Onion Address & Fingerprint with your team.
Persistent Identity (Recommended):
./isotope client \
--username "Ghost" \
--address "onion_address.onion:7878" \
--peer-fingerprint "SERVER_FINGERPRINT" \
--identity ghost.idEphemeral Mode (No Trace):
./isotope client \
--username "Ghost" \
--address "onion_address.onion:7878" \
--peer-fingerprint "SERVER_FINGERPRINT" \
--tempWhen creating an identity (.id), you must set two passwords:
- REAL Password: Logs into your standard operational profile.
- DURESS Password: Logs into a "Casual" decoy profile.
- Safe to provide if forced. Checks out perfectly but reveals nothing.
| Command | Description |
|---|---|
/msg <user> <txt> |
Direct Message (DM). |
/ttl <user> <sec> <txt> |
Self-Destructing Message. |
/send <file> |
Secure file transfer (encrypted/padded). |
/get <id> |
Download offered file. |
/browse |
Open interactive file picker for uploads. |
/vault_put <file> |
Move file to Hidden Vault. |
/vault_get <file> |
Extract file from Hidden Vault. |
/nuke |
PANIC PROTOCOL: Send distress signal + Wipe Data. |
Ctrl+c |
Safe Quit. |
Ctrl+x |
PANIC PROTOCOL (Instant). |
This project is open-source. We welcome your pull requests!
- Fork the repository.
- Create a feature branch (
git checkout -b feature/AmazingFeature). - Commit your changes.
- Open a Pull Request.
Let's experience the cyberspace.
