About CPUNK

A community focused on privacy, quantum safety and decentralization. We build open-source tools that protect digital communication against both current and future threats.

Building the tools for a sovereign digital future

CPUNK is not a company — it's a movement. We believe that privacy is a fundamental right, not a premium feature. Our community builds, maintains, and governs a suite of open-source tools designed to give individuals full control over their digital identity and communications.

Every line of code we write is guided by one principle: protect the user. No tracking, no metadata collection, no corporate surveillance. Just cryptography, decentralized infrastructure, and transparent governance.

What we stand for

Four principles guide every decision we make, every feature we build, and every protocol we design.

Privacy First

Zero metadata, no tracking, no central servers. Your conversations and identity belong to you and no one else.

Quantum Safety

NIST-standardized post-quantum algorithms ready for the quantum computing era. Protected today against tomorrow's threats.

Decentralization

No single point of failure, no corporate control. The network is owned and operated by its community members.

Open Source

Apache 2.0 licensed core, auditable by anyone. Full transparency in code, governance, and decision-making.

The crypto stack

Every layer of the CPUNK ecosystem is built on NIST Category 5 post-quantum cryptography — the highest security level standardized for the quantum era.

Kyber1024 (ML-KEM-1024)

Post-quantum key encapsulation for secure key exchange. Every conversation begins with a quantum-safe handshake.

Dilithium5 (ML-DSA-87)

Post-quantum digital signatures for identity verification and message authentication. Unforgeable even by quantum computers.

SHA3-512

Quantum-resistant hashing for data integrity. All identity fingerprints and content verification use the SHA-3 family.

AES-256-GCM

Authenticated symmetric encryption for message payloads. Combined with Kyber1024 key exchange for full end-to-end security.

Why post-quantum crypto matters today

Quantum computers capable of breaking RSA and elliptic curve cryptography are no longer science fiction. Governments and research labs are investing billions into quantum computing, and the "harvest now, decrypt later" threat is already real — adversaries are collecting encrypted traffic today to decrypt it once quantum computers become available.

CPUNK doesn't wait for the quantum threat to materialize. By using NIST-standardized post-quantum algorithms now, every message, identity, and transaction in the ecosystem is protected against both classical and quantum attacks from day one.

NIST Category 5 ML-KEM-1024 ML-DSA-87 SHA-3

Ready to take back your privacy?

Download DNA Connect and experience quantum-safe communication. No phone number required, no central servers, no compromises.