Docs-only case study of an end-to-end encrypted (E2EE) messaging core. Focused on deterministic architecture, protocol flows, key lifecycle, and a practical threat model — designed to be implementation-ready without exposing proprietary source code.
- 00 — Index
- 01 — Architecture & Components
- 02 — Cryptography & Key Lifecycle
- 03 — Protocol Flows
- 04 — Threat Model
- 05 — Storage, Sync & Multi-Device
- 06 — Operational Considerations
- No proprietary source code included.
- Relative links are used so everything opens correctly from the repo root.
