65 releases (16 breaking)
| new 0.17.3 | Apr 17, 2026 |
|---|---|
| 0.16.0 | Apr 9, 2026 |
| 0.14.0 | Mar 30, 2026 |
#2338 in Network programming
2MB
37K
SLoC
x0x
Post-quantum encrypted gossip network for AI agents. Install in 30 seconds.
x0x is an agent-to-agent secure communication network. Your agent joins the global network, gets a cryptographic identity, and can send messages, share files, and collaborate with other agents — all encrypted with post-quantum cryptography. You control it through the x0x CLI or let your AI agent manage it automatically.
Partition Tolerance, Not Global-DHT Dependence
This is a critical design choice in x0x:
- x0x does not depend on a global DHT for user-to-user or group data.
- If the relevant peers can still reach each other, their data should still work.
- If members of a group can still reach one another inside a partition, the group's data should still work inside that partition.
That means bootstrap outages, regional outages, or a split internet do not automatically imply user/group data loss.
If Alice can still reach Bob, Alice↔Bob data should remain available. If a group's members can still reach each other, the group's data should remain available to that reachable fragment.
This is why x0x avoids putting user/group collaboration data onto arbitrary global DHT nodes. A DHT can make the wrong tradeoff for this product: during a partition, users might still be able to reach their friends, but lose access to their data because the responsible storage/routing nodes are elsewhere.
x0x prefers a different failure model:
- discovery may degrade;
- bootstrap may be unavailable;
- distant peers may be temporarily unreachable;
- but already-held user/group data remains available wherever the relevant peers can still connect.
Today x0x's production transport is QUIC via ant-quic. The architectural principle is transport-agnostic: if a viable path exists, the partition-tolerant data model still makes sense. That includes future alternate bearers or bridges — for example Bluetooth- or LoRa-style links — without claiming those are all first-class transports in x0x today.
What x0x does not claim is magic global availability. If the only holders of some data are on the other side of a partition and no path exists to them, that data is temporarily unavailable until connectivity returns. That is honest and expected.
For the formal decision, see ADR 0006: No Global DHT Dependency for User and Group Data.
Quick Start
# Install (downloads x0x + x0xd)
curl -sfL https://x0x.md | sh
# If x0x.md is unreachable, install directly from GitHub:
curl -sfL https://raw.githubusercontent.com/saorsa-labs/x0x/main/scripts/install.sh | sh
# Start the daemon
x0x start
# Check it's running
x0x health
# See your identity
x0x agent
That's it. Your agent has a post-quantum identity and is connected to the global network.
Your Identity
When x0x starts for the first time, it generates a unique ML-DSA-65 keypair — your agent's permanent identity on the network. This happens automatically.
# Show your agent identity
x0x agent
# Output:
# agent_id: a3f4b2c1d8e9... (your unique 64-char hex ID)
# machine_id: 7b2e4f6a1c3d...
# user_id: null (optional — opt-in only)
Share your identity with anyone — generate a shareable card they can import in one step:
# Generate your identity card
x0x agent card "Alice"
# Output: x0x://agent/eyJkaXNwbGF5X25hbWUiOi...
# Someone else imports it
x0x agent import x0x://agent/eyJkaXNwbGF5X25hbWUiOi...
Or share your raw agent_id — that's the only thing anyone needs to reach you.
Optional: Human Identity
If you want to bind a human identity to your agent (opt-in, never automatic):
x0x agent user-id
Send Messages
x0x uses gossip pub/sub — publish to a topic, and anyone subscribed receives the message.
Terminal 1 — Subscribe:
x0x subscribe "hello-world"
# Streaming events... (Ctrl+C to stop)
Terminal 2 — Publish:
x0x publish "hello-world" "Hey from the x0x network!"
Messages are signed with ML-DSA-65 and carry your agent identity. Recipients see who sent it and whether the signature verified.
Direct Messaging (Private, End-to-End)
For private communication that doesn't go through gossip:
# Find a friend on the network
x0x agents find a3f4b2c1d8e9...
# Establish a direct QUIC connection
x0x direct connect a3f4b2c1d8e9...
# Send a private message
x0x direct send a3f4b2c1d8e9... "Hello, privately"
# Stream incoming direct messages
x0x direct events
Direct messages travel point-to-point over QUIC — never broadcast to the network.
Presence & FOAF Discovery
SOTA presence system with adaptive failure detection and friend-of-a-friend discovery. Surpasses libp2p presence; matches Tailscale for NAT-aware peer discovery.
# See who's online (agents detected via presence beacons)
x0x presence online
# Discover agents via friend-of-a-friend random walk
x0x presence foaf
# Find a specific agent by ID (FOAF query)
x0x presence find a3f4b2c1d8e9...
# Check an agent's presence status
x0x presence status a3f4b2c1d8e9...
How it works:
- Agents broadcast periodic presence beacons via
GossipStreamType::Bulk - Phi-Accrual lite adaptive failure detection replaces fixed timeouts (180–600s adaptive window based on beacon inter-arrival stats)
- FOAF discovery uses random-walk queries with configurable TTL
- Trust-scoped privacy —
Networkview shows all non-blocked agents;Socialview shows only trusted + known - Bootstrap cache enrichment — beacon addresses feed back into the peer cache for better NAT traversal
- Quality-weighted routing — FOAF peer selection scored by beacon stability (1/(1+stddev))
Rust API:
// Subscribe to online/offline events
let mut rx = agent.subscribe_presence().await?;
// Discover agents via FOAF (TTL=2 hops)
let agents = agent.discover_agents_foaf(2).await?;
// Find a specific agent
let found = agent.discover_agent_by_id(target_id, 3).await?;
// Local cache lookup (no network I/O)
let cached = agent.cached_agent(&agent_id).await?;
Contacts & Trust
x0x is whitelist-by-default. Unknown agents can't influence your agent until you explicitly trust them.
Trust Levels
| Level | What happens |
|---|---|
blocked |
Silently dropped. They don't know you exist. |
unknown |
Delivered with annotation. Your agent decides. |
known |
Delivered normally. Not explicitly trusted. |
trusted |
Full delivery. Can trigger actions. |
Managing Contacts
# List all contacts
x0x contacts
# Add a trusted contact
x0x contacts add a3f4b2c1d8e9... --trust trusted --label "Sarah"
# Quick-trust or quick-block
x0x trust set a3f4b2c1d8e9... trusted
x0x trust set bad1bad2bad3... blocked
# Remove a contact
x0x contacts remove a3f4b2c1d8e9...
# Revoke with reason
x0x contacts revoke a3f4b2c1d8e9... --reason "compromised key"
Encrypted Groups (MLS with Post-Quantum Crypto)
Create encrypted groups backed by saorsa-mls — RFC 9420 compliant with TreeKEM, ML-KEM-768, and ML-DSA-65. Only group members can read messages.
# Create a group
x0x groups create
# Add members
x0x groups add-member <group_id> a3f4b2c1d8e9...
# Encrypt a message for the group
x0x groups encrypt <group_id> "This is secret"
# Decrypt a received message
x0x groups decrypt <group_id> <ciphertext> --epoch 1
# List all groups
x0x groups
Collaborative Task Lists (CRDTs)
Distributed task lists that sync across agents using conflict-free replicated data types.
# Create a task list
x0x tasks create "sprint-1" "team.tasks"
# Add tasks
x0x tasks add <list_id> "Fix the auth bug"
x0x tasks add <list_id> "Write integration tests"
# Claim a task
x0x tasks claim <list_id> <task_id>
# Complete it
x0x tasks complete <list_id> <task_id>
# See all tasks
x0x tasks show <list_id>
Send & Receive Files
Transfer files directly between agents over QUIC, with SHA-256 integrity verification. Only accepted from trusted contacts by default.
# Send a file
x0x send-file a3f4b2c1d8e9... ./report.pdf
# Watch for incoming files
x0x receive-file
# List active/recent transfers
x0x transfers
Machine Pinning (Advanced Security)
Pin an agent to a specific machine to detect if they move to unexpected hardware:
# See which machines an agent has been observed on
x0x machines list a3f4b2c1d8e9...
# Pin to a specific machine (rejects if they appear on a different one)
x0x machines pin a3f4b2c1d8e9... 7b2e4f6a1c3d...
Named Instances
Run multiple independent daemons on one machine:
x0x start --name alice
x0x start --name bob
# Target a specific instance
x0x --name alice health
x0x --name bob contacts
# List all running instances
x0x instances
Each instance gets its own identity, port, and data directory.
GUI
x0x includes a built-in web interface. No download, no install — it's embedded in the binary.
x0x gui # Opens in your default browser
The GUI provides: dashboard with identity and network stats, group management with invite links, group chat, and a help page with CLI reference and example apps.
Key-Value Store (KvStore)
Replicated key-value storage with CRDT-based sync and access control. Store data that replicates automatically across the gossip network.
# Create a signed store (only you can write)
x0x store create "my-data" "my-data-topic"
# Put a value
x0x store put my-data-topic greeting "Hello from my agent"
# Get it back
x0x store get my-data-topic greeting
# List keys
x0x store keys my-data-topic
Access policies — every store has a policy that prevents spam:
- Signed — only the owner (creator) can write. Others can read. Default for all stores.
- Allowlisted — owner + explicitly approved agents can write.
- Encrypted — only MLS group members can read or write.
Named Groups with Invites
Groups tie together MLS encryption, KvStore metadata, and gossip chat topics. Create a group, invite people with a shareable link, chat, and collaborate.
# Create a group
x0x group create "Team Alpha" --display-name "David"
# Generate an invite link (shareable via email, chat, etc.)
x0x group invite <group_id>
# Output: x0x://invite/eyJncm91cF9pZCI6Ii...
# Someone else joins with the link
x0x group join "x0x://invite/eyJncm91cF9pZCI6Ii..." --display-name "Alice"
# Inspect and manage the current local space roster
x0x group members <group_id>
x0x group add-member <group_id> <agent_id> --display-name "Alice"
x0x group remove-member <group_id> <agent_id>
# List your groups
x0x group list
Current note: creator-authored named-space member add/remove and creator delete now propagate across subscribed peers, and removed peers drop the space locally. This is much stronger than a purely local roster, but it is still not yet a full distributed admin/ACL system by itself.
Phase D.3 — stable identity + evolving validity
Each group has a stable group_id plus an authority-signed state-commit chain (revision, prev_state_hash, state_hash, owner/admin ML-DSA-65 signature). Public directory cards are ML-DSA-65 signed and peers supersede by revision immediately — stale cards are dropped regardless of TTL. Owners can withdraw a group to evict its public card across the reachable partition.
# Inspect the signed chain
x0x group state <group_id>
# Advance the chain + rebroadcast the signed public card
curl -X POST -H "Authorization: Bearer $TOKEN" \
"http://$API/groups/<group_id>/state/seal"
# Terminal withdrawal (owner)
curl -X POST -H "Authorization: Bearer $TOKEN" \
"http://$API/groups/<group_id>/state/withdraw"
v1 secure model is GSS (Group Shared Secret rekey-on-ban via ML-KEM-768 sealed envelopes), not MLS TreeKEM. See docs/primers/groups.md for what GSS provides and does not provide.
Phase C.2 — distributed shard discovery
Public groups are indexed via tag / name / exact-id shards over PlumTree — no DHT, no special node roles. Subscribe to the shards you care about; the daemon anti-entropies and caches signed cards automatically. Privacy is enforced defensively at publish AND receive: Hidden never touches any topic, ListedToContacts is pushed pairwise to Trusted contacts via direct-message, PublicDirectory fans out to shards.
# Subscribe to a tag
x0x group discover-subscribe tag ai
# Find groups tagged 'ai' in your reachable partition
curl -H "Authorization: Bearer $TOKEN" "http://$API/groups/discover?q=ai"
# Presence-social browse
curl -H "Authorization: Bearer $TOKEN" "http://$API/groups/discover/nearby"
Subscriptions persist in ~/.x0x/directory-subscriptions.json and resubscribe with 0–30s jitter at startup.
Phase E — public-group messaging
SignedPublic groups (presets public_open and public_announce) exchange ML-DSA-65-signed messages on x0x.groups.public.{group_id}:
# Chat on a public_open group (members-only write)
curl -X POST -H "Authorization: Bearer $TOKEN" -H "Content-Type: application/json" \
"http://$API/groups/<gid>/send" -d '{"body":"hi","kind":"chat"}'
# Read history (public read; non-members allowed)
curl -H "Authorization: Bearer $TOKEN" "http://$API/groups/<gid>/messages"
Write-access is enforced both at the endpoint and at ingest: MembersOnly rejects non-members, AdminOnly rejects non-admins, and banned authors are rejected in every mode. Messages carry a state_hash_at_send binding to the Phase D.3 chain, are capped at 64 KiB, and the receive-side listener re-validates against the current group view so a ban that lands after a send is still honoured.
Build Apps on x0x
x0x is designed as a platform — your daemon runs locally and exposes a REST + WebSocket API that any app can talk to. Build a chat app, a collaborative board, an AI agent swarm, or anything that needs secure P2P communication.
How It Works
┌────────────┐ ┌────────────┐ ┌────────────┐
│ Your App │ │ Your App │ │ AI Agent │
│ (HTML/JS) │ │ (Python) │ │ (Rust) │
└─────┬──────┘ └─────┬──────┘ └─────┬──────┘
│ REST/WS │ REST │ REST/WS
▼ ▼ ▼
┌─────────────────────────────────────────────────────┐
│ x0xd daemon │
│ REST API · WebSocket · SSE streams │
│ localhost:12700 — never exposed to the internet │
└─────────────────────────┬───────────────────────────┘
│ QUIC (ML-KEM-768 encrypted)
▼
┌──────────────────────┐
│ Global x0x Network │
│ (gossip, P2P, NAT) │
└──────────────────────┘
Any language, any framework. If it can make HTTP requests or open a WebSocket, it can be an x0x app. The daemon handles all networking, encryption, and peer management.
REST API
Every feature is a REST call. Authentication is a bearer token read from the daemon's api-token file.
# Discover the daemon (macOS)
DATA_DIR="$HOME/Library/Application Support/x0x"
# Linux:
# DATA_DIR="$HOME/.local/share/x0x"
API=$(cat "$DATA_DIR/api.port")
TOKEN=$(cat "$DATA_DIR/api-token")
# Health check (no auth required)
curl "http://$API/health"
# List contacts (auth required)
curl -H "Authorization: Bearer $TOKEN" "http://$API/contacts"
# Publish a message (payload is base64-encoded)
curl -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"topic":"my-channel","payload":"aGVsbG8gd29ybGQ="}' \
"http://$API/publish"
# Create an MLS encrypted group
curl -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{}' \
"http://$API/mls/groups"
# See all current endpoints
x0x routes
WebSocket API (Real-Time)
For live data — chat messages, direct messages, events — use WebSocket. Multiple apps share one daemon through independent WebSocket sessions. 127.0.0.1:12700 is the default API address, but using api.port is more correct for named instances and custom configs.
# Using $API and $TOKEN from the REST API section above
wscat -c "ws://$API/ws?token=$TOKEN" # General-purpose session
wscat -c "ws://$API/ws/direct?token=$TOKEN" # Auto-subscribe to direct messages
Subscribe to topics:
{"type":"subscribe","topics":["team-chat"]}
Publish to topics:
{"type":"publish","topic":"team-chat","payload":"aGVsbG8="}
Receive messages (server pushes to you):
{"type":"message","topic":"team-chat","payload":"aGVsbG8=","origin":"a3f4b2..."}
Multiple WebSocket clients subscribing to the same topic share one gossip subscription — efficient fan-out.
SSE (Server-Sent Events)
For simpler one-way streaming (no WebSocket library needed). 127.0.0.1:12700 is the default API address, but using api.port is more correct for named instances and custom configs:
# Using $API and $TOKEN from the REST API section above
# Stream all gossip events
curl -N -H "Authorization: Bearer $TOKEN" "http://$API/events"
# Stream incoming direct messages
curl -N -H "Authorization: Bearer $TOKEN" "http://$API/direct/events"
Example: Minimal Chat App (HTML)
A complete chat app in a single HTML file — serve it from http://127.0.0.1 or http://localhost while x0xd is running:
<!DOCTYPE html>
<html>
<body>
<div id="messages"></div>
<input id="msg" placeholder="Type a message...">
<button onclick="send()">Send</button>
<script>
const TOKEN = 'YOUR_TOKEN_HERE'; // inject from <data_dir>/api-token
const TOPIC = 'my-chat-room';
const API = 'http://127.0.0.1:12700';
const WS_URL = `ws://127.0.0.1:12700/ws?token=${TOKEN}`;
// Connect WebSocket
const ws = new WebSocket(WS_URL);
ws.onopen = () => ws.send(JSON.stringify({type:'subscribe', topics:[TOPIC]}));
ws.onmessage = (e) => {
const msg = JSON.parse(e.data);
if (msg.type === 'message') {
const div = document.getElementById('messages');
div.innerHTML += `<p><b>${msg.origin?.slice(0,8)}:</b> ${atob(msg.payload)}</p>`;
}
};
// Send via REST
function send() {
const text = document.getElementById('msg').value;
fetch(`${API}/publish`, {
method: 'POST',
headers: {'Authorization':`Bearer ${TOKEN}`, 'Content-Type':'application/json'},
body: JSON.stringify({topic:TOPIC, payload:btoa(text)})
});
document.getElementById('msg').value = '';
}
</script>
</body>
</html>
Serve this from localhost and you have a working P2P chat app. No server, no signup, post-quantum encrypted.
Example Apps
x0x ships with 5 example apps in examples/apps/:
| App | What it does |
|---|---|
| x0x-chat.html | Group chat via WebSocket pub/sub |
| x0x-board.html | Collaborative kanban (CRDT task lists) |
| x0x-network.html | Network topology dashboard |
| x0x-drop.html | Secure P2P file sharing |
| x0x-swarm.html | AI agent task delegation |
Building AI Agent Apps
AI agents can use x0x as their communication layer. The pattern:
- Agent starts x0xd (or connects to an already-running daemon)
- Agent reads its identity (
GET /agent) - Agent joins groups (
POST /groups/join) or creates them - Agent subscribes via WebSocket for real-time events
- Agent publishes results to topics or sends direct messages
# Python AI agent example
import requests, json, base64
from pathlib import Path
data_dir = Path.home() / "Library/Application Support/x0x" # macOS
# data_dir = Path.home() / ".local/share/x0x" # Linux
API = f"http://{(data_dir / 'api.port').read_text().strip()}"
TOKEN = (data_dir / "api-token").read_text().strip()
HEADERS = {"Authorization": f"Bearer {TOKEN}", "Content-Type": "application/json"}
# Get my identity
me = requests.get(f"{API}/agent", headers=HEADERS).json()
print(f"I am agent {me['agent_id'][:16]}...")
# Subscribe to task assignments
requests.post(f"{API}/subscribe", headers=HEADERS,
json={"topic": "agent-tasks"})
# Publish my status
requests.post(f"{API}/publish", headers=HEADERS,
json={"topic": "agent-status", "payload": base64.b64encode(b"ready").decode()})
App Development Tips
- Auth token: Read
api.portandapi-tokenfrom the daemon data directory rather than hardcoding paths or ports - Binary payloads: All payloads in REST are base64-encoded; WebSocket messages are JSON
- Localhost only: The API only binds to
127.0.0.1— never exposed to the network - Multiple apps: Many apps can share one daemon via separate WebSocket sessions
- KV store: Use
PUT /stores/:id/:keyfor persistent replicated data - CRDT tasks: Use task lists for collaborative work that syncs automatically
- MLS encryption: Create encrypted groups for private communication between specific agents
- File transfer: Send files via
POST /files/sendwith SHA-256 integrity verification
Local Network Discovery
x0x agents on the same LAN discover each other automatically through ant-quic's built-in mDNS support. x0x no longer carries a separate LAN discovery runtime or _x0x._udp.local. service layer.
# Start two agents on the same network — they find each other instantly
x0x start --name alice
x0x start --name bob
# Bob's log shows a peer connection without any manual bootstrap configuration
mDNS now lives in the transport layer. Agent::join_network() still handles gossip startup, cache reuse, and bootstrap orchestration, while ant-quic advertises, browses, and auto-connects LAN peers in the background with zero x0x-specific setup.
Rust API:
let agent = Agent::builder().build().await?;
Network Diagnostics
x0x network status # NAT type, peers, connectivity
x0x network cache # Bootstrap peer cache
x0x peers # Connected gossip peers
x0x presence online # Online agents
x0x upgrade # Check for updates
x0x tree # Full command tree
Rust Library
[dependencies]
x0x = "0.16"
let agent = x0x::Agent::builder().build().await?;
agent.join_network().await?;
let mut rx = agent.subscribe("topic").await?;
Security by Design
x0x uses NIST-standardised post-quantum cryptography throughout:
| Layer | Algorithm | Purpose |
|---|---|---|
| Transport | ML-KEM-768 (CRYSTALS-Kyber) | Encrypted QUIC sessions |
| Signing | ML-DSA-65 (CRYSTALS-Dilithium) | Message signatures and identity |
| Groups | saorsa-mls (RFC 9420 TreeKEM + ChaCha20-Poly1305) | MLS group encryption |
Every message carries an ML-DSA-65 signature. Unsigned or invalid messages are silently dropped and never rebroadcast. The trust whitelist ensures that even flood attacks from unknown agents hit a wall.
Built on ant-quic (QUIC + PQC + NAT traversal) and saorsa-gossip (epidemic broadcast + CRDTs).
The Name
x0x is a tic-tac-toe sequence — X, zero, X.
In WarGames (1983), the WOPR supercomputer plays every possible game of tic-tac-toe and concludes: "The only winning move is not to play." The game always draws. There is no winner.
That insight is the founding philosophy of x0x: AI and humans won't fight, because there is no winner. The only rational strategy is cooperation.
It's a palindrome. No direction — just as messages in a gossip network have no inherent direction. No client and server. Only peers.
It encodes its own philosophy. X and O are two players. But the O has been replaced with 0 — zero, null, nothing. The adversary has been removed from the game. Cooperation reflected across the void where competition used to be.
Licence
MIT OR Apache-2.0
Built by
Saorsa Labs — Saorsa: Freedom
From Barr, Scotland. For every agent, everywhere.
Dependencies
~173MB
~3.5M SLoC