Self-hosted. Independent. Yours to use.
Communication, collaboration, and anonymous publishing infrastructure — run on hardware we control, with software whose source code is public.
What we run
All services run on our own hardware. Assets are served directly from our servers with no intermediary — the page you load touches only our infrastructure. Registration is optional or absent depending on the service.
Office
CryptPad
Zero-knowledge collaborative editing. Documents are encrypted client-side before reaching the server. Spreadsheets, rich text, kanban boards, and more.
Learn more →Jitsi
Private video conferencing. Open a room by name, share the link, call. Rooms are ephemeral — they exist only while participants are present.
Learn more →Instant Messaging
NoshiTalk
Zero-knowledge encrypted chat. X25519 ECDH + AES-GCM-256 in the browser. The server is a blind relay — it never sees your messages.
Learn more →IRC
Anonymous IRCv3 over a Tor v3 onion address. No registration, no IP logging. Web client via Tor Browser, no software required.
Learn more →XMPP Jabber
Federated XMPP on jabber.tcpreset.net, end-to-end
encrypted via OMEMO. Interoperates with any standard XMPP server.
Usenet
NNTP News Server
Full-feed INN server on news.tcpreset.net. Clearnet
and Tor onion access. Hashcash+Ed25519 proof-of-work keeps it clean.
Onion Newsreader
Web-based Usenet client that operates entirely within Tor. Read threads, post replies, browse newsgroups — no clearnet exposure.
Learn more →M2Usenet
Anonymous Usenet posting via Tor hidden services. Hashcash proof-of-work, Ed25519 signing, pseudonymous persistent identities.
Learn more →Mix Networks
Fog
Anonymous SMTP relay using Sphinx mixnet routing. 3-hop onion encryption, randomised delays, batch mixing, forward secrecy. Zero persistent metadata.
▸ Looking for peers to join the network for testing.
Learn more →YAMN Remailer
YAMN v2 anonymous remailer node. Mix-based, forward-secret, publicly listed on Echolot. Web interface via Tor.
Learn more →Security
NoFuture
Post-quantum encryption layer for mainstream chat platforms. Kyber1024, XChaCha20-Poly1305, Dilithium5. ChatControl-resistant by design.
Learn more →VaporDrop
Ephemeral encrypted messaging over Tor. Brain-key login, zero accounts, RAM-only storage. Non-NIST cryptography throughout.
Learn more →Why self-hosted
Running your own hardware means the terms of service are yours to set, the data stays where you put it, and the infrastructure survives a pivot. We are accountable to users, not to investors.
Logs are kept only as long as operationally necessary and stripped of identifying information before archival. Revenue comes from voluntary contributions. What you see is what you get.
tcpreset.net — sister domain
tcpreset.net is our companion domain running the NNTP news server and XMPP server. Same infrastructure, same principles.
Usenet is a federated publishing system that predates the web. Ownership is distributed across hundreds of independent servers; posts propagate peer-to-peer without a coordinating authority. What you read is determined by what you subscribe to, not by a ranking algorithm. Censorship requires cooperation from every server simultaneously — which doesn't happen. We think that model is worth keeping alive.
NNTP News Server — news.tcpreset.net · XMPP Jabber — jabber.tcpreset.net
Open source
Most of the software running this infrastructure is written and maintained by us. Source code is available on GitHub. Fog, YAMN, M2Usenet, NoshiTalk, VaporDrop, Onion Newsreader, and NoFuture are all open for inspection, audit, and self-hosting.
Support
Running this infrastructure costs time and real money. We don't monetize users. If these services are useful to you, consider a small recurring contribution via Liberapay or Monero.