Skip to main content

Security

NTL’s security model is built on three principles:
  1. Crypto agnosticism — No cryptographic scheme is hardcoded into the protocol
  2. Post-quantum readiness — Default implementations use quantum-resistant algorithms
  3. Defense in depth — Security exists at every layer, not just the transport

Threat Model

NTL is designed to resist:
ThreatMitigation
Signal interceptionEnd-to-end encryption via pluggable crypto
Signal spoofingCryptographic signatures on all signals
Signal replayULID timestamps + deduplication cache
Node impersonationIdentity verification (local keys or DID)
Topology mappingLocal-knowledge design, truncated traces
Quantum cryptanalysisPluggable crypto with PQ defaults
Spam/DoSActivation thresholds + weight attenuation
Sybil attacksSynapse weight requires sustained valuable participation

Layers of Security

Signal Layer

Every signal is:
  • Signed by the emitting node’s identity key
  • Optionally encrypted end-to-end for targeted signals
  • Timestamped with ULID for replay prevention
  • Traceable for audit (with optional trace truncation for privacy)

Synapse Layer

Every synapse:
  • Performs a cryptographic handshake on formation
  • Negotiates transport encryption (QUIC provides this by default)
  • Is authenticated — both nodes verify each other’s identity

Network Layer

The propagation engine provides:
  • Weight-based spam resistance — New nodes start with low-weight synapses; you can’t flood the network without earning weight through valuable participation
  • Activation thresholds — Natural rate limiting that adapts to conditions
  • Deduplication — Prevents amplification attacks

Further Reading

Pluggable Crypto

How NTL’s crypto module works

Post-Quantum

Quantum readiness approach

Identity

Node identity and verification