Official NỌX publications: detailed descriptions and source PDF downloads. For unchangeable documents, SHA-256 checksum is provided for integrity verification.
NỌX License and Terms (AGPL-3.0 + additions)
Official NỌX package: concise English language summary of AGPL-3.0, additional NỌX terms, and consolidated privacy policy. Principles: code openness, network obligation to publish source code, no tracking, data minimization. Full English text is included inside.
Technical specification of the NỌX crypto algorithm: goals, threat model, used primitives, key exchange, message formats, and security parameters. Document for engineers and audit. Full text available in PDF; Certification is impossible in the coming years due to technical infeasibility.
Official NỌX document, notarized and presented in anonymized form due to confidentiality. Originals are stored with NỌX, notary, and in independent storage; provided only in case of official proceedings or disputes. Document in English; the English original has legal force.
System development stages: from basic P2P without servers and data storage — to expanding capabilities, enhancing resilience, and creating a decentralized community. Principles: no data collection, deep encryption, anonymity, and global availability.
The NỌX Narrative is a structured exposition of the meaning underlying the project. It traces humanity’s path from ancient forms of communication to digital dependency, reveals the dangers of total surveillance and the devaluation of the word, and justifies the need to create NỌX — a space of silence, freedom, and protection.
We are forming the core of the NỌX space.
You cannot enter by recommendation. You cannot buy access.
The only thing required is your conscious decision.
We are not interested in biographies, diplomas, age, religion, or country.
We don’t need third-party approval — we look at the essence.
But besides intention, we need knowledge and super-skills.
Those who can act — precisely, clearly, silently.
Those who can not only do but understand why it is done.
We seek those who might one day certify the impossible.
Or create what requires no certification at all.
If you feel this is yours — you are already on the way.
COMING SOON!..
The evolution of censorship and internet control practices in key countries around the world in the second half of 2025. The analysis is based on a comparison of three dominant models of state behavior: their technological tools, legal foundations, and geopolitical objectives.