The NỌX System

MATERIALS

NỌX

Materials

Official NỌX publications: detailed descriptions and source PDF downloads. For unchangeable documents, SHA-256 checksum is provided for integrity verification.

NỌX License and Terms (AGPL-3.0 + additions)

Official NỌX package: concise English language summary of AGPL-3.0, additional NỌX terms, and consolidated privacy policy. Principles: code openness, network obligation to publish source code, no tracking, data minimization. Full English text is included inside.

Crypto Algorithm Specification

Technical specification of the NỌX crypto algorithm: goals, threat model, used primitives, key exchange, message formats, and security parameters. Document for engineers and audit. Full text available in PDF; Certification is impossible in the coming years due to technical infeasibility.

Notarized NỌX Authorship Declaration (EN)

Official NỌX document, notarized and presented in anonymized form due to confidentiality. Originals are stored with NỌX, notary, and in independent storage; provided only in case of official proceedings or disputes. Document in English; the English original has legal force.

SHA‑256: 7f2e4e1f92dfbdca17e87739caefa4ac3e4535f12e82f2d88a01faf296ba497c

NỌX Roadmap

System development stages: from basic P2P without servers and data storage — to expanding capabilities, enhancing resilience, and creating a decentralized community. Principles: no data collection, deep encryption, anonymity, and global availability.

NỌX Narrative

The NỌX Narrative is a structured exposition of the meaning underlying the project. It traces humanity’s path from ancient forms of communication to digital dependency, reveals the dangers of total surveillance and the devaluation of the word, and justifies the need to create NỌX — a space of silence, freedom, and protection.

Entry Point to the NỌX Space

We are forming the core of the NỌX space. You cannot enter by recommendation. You cannot buy access. The only thing required is your conscious decision. We are not interested in biographies, diplomas, age, religion, or country. We don’t need third-party approval — we look at the essence. But besides intention, we need knowledge and super-skills. Those who can act — precisely, clearly, silently. Those who can not only do but understand why it is done. We seek those who might one day certify the impossible. Or create what requires no certification at all. If you feel this is yours — you are already on the way.
COMING SOON!..

Global Architecture of Digital Sovereignty

The evolution of censorship and internet control practices in key countries around the world in the second half of 2025. The analysis is based on a comparison of three dominant models of state behavior: their technological tools, legal foundations, and geopolitical objectives.

Back