Nym is an evolving
mix network
Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
(mixnet), a type of computer
network
Network, networking and networked may refer to:
Science and technology
* Network theory, the study of graphs as a representation of relations between discrete objects
* Network science, an academic field that studies complex networks
Mathematics
...
infrastructure for privacy that masks user
metadata
Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including:
* Descriptive ...
, separating source and destination
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es.
It
anonymizes various types of communication, including messaging, files transfers, payments transactions, and web browsing on basic websites.
The project is built on
free and open-source software
Free and open-source software (FOSS) is software available under a license that grants users the right to use, modify, and distribute the software modified or not to everyone free of charge. FOSS is an inclusive umbrella term encompassing free ...
and is
decentralized
Decentralization or decentralisation is the process by which the activities of an organization, particularly those related to planning and decision-making, are distributed or delegated away from a central, authoritative location or group and gi ...
, maintained by a distributed set of independent
nodes
In general, a node is a localized swelling (a "knot") or a point of intersection (a vertex).
Node may refer to:
In mathematics
*Vertex (graph theory), a vertex in a mathematical graph
*Vertex (geometry), a point where two or more curves, lines, ...
worldwide.
Nym is sometimes compared to
anonymity
Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
networks such as
Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
and
I2P
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by usin ...
,
although it differs in some aspects. Unlike these, Nym does not support hidden services (e.g.
.onion sites on Tor or
eepsites on I2P).
Data packets
In telecommunications and computer networking, a network packet is a formatted unit of data carried by a packet-switched network. A packet consists of control information and user data; the latter is also known as the '' payload''. Control inform ...
sent through the Nym mixnet are
encrypted
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plain ...
in multiple layers and routed through a series of nodes, including an entry
gateway, three "mix nodes", and an exit gateway to the
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. To mitigate
traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
risks, packets are standardized to a uniform size, mixned with cover traffic, and transmitted with randomized timing to obscure traffic patterns.
These methods aim to make it more difficult for adversaries with broad surveillance capabilities to correlate incoming and outgoing data flows.
Users can interact with the network via "NymVPN", a client application, or integrate Nym functionality into third-party applications using its
software development kit
A software development kit (SDK) is a collection of software development tools in one installable package. They facilitate the creation of applications by having a compiler, debugger and sometimes a software framework. They are normally specific t ...
(SDK).
History
The concept of a
mix network
Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
(mixnet) was introduced by
David Chaum
David Lee Chaum (born 1955) is an American computer scientist, List of cryptographers, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of Digital cur ...
in 1979 and later published in 1981. The
cypherpunk
A cypherpunk is one who advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk movement originated in the late 1980s and gained traction with th ...
movement contributed to the development of mixnets in the 1990s, though their practical applications remained limited, primarily in the form of
anonymous remailer
An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anony ...
s. In the 2000s, some anonymous communication networks—most notably
Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
—incorporated principles of mixnets, though Tor itself is based on
onion routing
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...
rather than a mixnet implementation.
The Nym mixnet originates from two
Horizon 2020
The Framework Programmes for Research and Technological Development, also called Framework Programmes or abbreviated FP1 to FP9, are funding programmes created by the European Union/European Commission to support and foster research in the Europe ...
research projects funded by the
European Commission
The European Commission (EC) is the primary Executive (government), executive arm of the European Union (EU). It operates as a cabinet government, with a number of European Commissioner, members of the Commission (directorial system, informall ...
following the
revelations on mass internet surveillance by the U.S. and U.K. governments:
Panoramix (2015–2019) and NEXTLEAP (2016–2018).
The mixnet originates from
academic research
Research is creative and systematic work undertaken to increase the stock of knowledge. It involves the collection, organization, and analysis of evidence to increase understanding of a topic, characterized by a particular attentiveness to ...
, with technologies associated with the project regularly presented at
scientific conferences in cybersecurity and cryptography, including
USENIX
USENIX is an American 501(c)(3) nonprofit membership organization based in Berkeley, California and founded in 1975 that supports advanced computing systems, operating system (OS), and computer networking research. It organizes several confe ...
,
NDSS,
and Privacy Enhancing Technologies Symposium (PETS).
These projects contributed to advancements in mixnet technologies, leading to the foundations of Nym in 2017:
* Harry Halpin, then a computer scientist at
INRIA
The National Institute for Research in Digital Science and Technology (Inria) () is a French national research institution focusing on computer science and applied mathematics.
It was created under the name French Institute for Research in Comp ...
, conceived of the idea after a discussion with
Adam Back
Adam Back (born July 1970) is a British cryptographer and cypherpunk. He is the CEO of Blockstream, which he co-founded in 2014. He invented Hashcash, which is used in the bitcoin mining process.
Life
Back was born in London, England, in July ...
in 2017 on how to improve
online privacy
Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. P ...
through a decentralized computing network that could take advantage of spare computing power to mix packets.
* Cryptographers Ania Piotrowska and
George Danezis of
University College London
University College London (Trade name, branded as UCL) is a Public university, public research university in London, England. It is a Member institutions of the University of London, member institution of the Federal university, federal Uni ...
(UCL) introduced the "Loopix"
architecture, which influenced Nym.
Loopix integrated existing privacy-enhancing techniques to strengthen mixnet properties, including "Sphinx"
packet
Packet may refer to:
* A small container or pouch
** Packet (container), a small single use container
** Cigarette packet
** Sugar packet
* Network packet, a formatted unit of data carried by a packet-mode computer network
* Packet radio, a form ...
format,
cover traffic,
exponential
Exponential may refer to any of several mathematical topics related to exponentiation, including:
* Exponential function, also:
**Matrix exponential, the matrix analogue to the above
*Exponential decay, decrease at a rate proportional to value
* Ex ...
mixing delays, a layered network
topology
Topology (from the Greek language, Greek words , and ) is the branch of mathematics concerned with the properties of a Mathematical object, geometric object that are preserved under Continuous function, continuous Deformation theory, deformat ...
, and
Poisson-process-based packet transmission.
In 2018, Harry Halpin white-boarded the idea to
Moxie Marlinspike
Moxie Marlinspike is an American entrepreneur, cryptographer, and computer security researcher. Marlinspike is the creator of Signal (messaging app), Signal, co-founder of the Signal Technology Foundation, and served as the first CEO of Signal M ...
and
Trevor Perrin of
Signal
A signal is both the process and the result of transmission of data over some media accomplished by embedding some variation. Signals are important in multiple subject fields including signal processing, information theory and biology.
In ...
and decided to launch Nym. An alpha version of Nym was presented at the 36th
Chaos Communication Congress
The Chaos Communication Congress is an annual hacker conference organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues related to security, cryptography, privacy and ...
(36C3) in December 2019.
In February 2021, a
white paper
A white paper is a report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter. It is meant to help readers understand an issue, solve a problem, or make a decision. Since the 199 ...
co-authored by Harry Halpin,
Claudia Diaz (
KU Leuven
KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries.
In addition to its mai ...
), and Aggelos Kiayias provided details on Nym’s technical and operational design.
In 2021,
Chelsea Manning
Chelsea Elizabeth Manning (born Bradley Edward Manning, December 17, 1987) is an American activist and whistleblower. She is a former United States Army soldier who was convicted by court-martial in July 2013 of violations of the Espionage ...
, a former U.S. Army intelligence analyst and
whistleblower
Whistleblowing (also whistle-blowing or whistle blowing) is the activity of a person, often an employee, revealing information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe, unethical or ...
, conducted a
security audit
An information security audit is an audit of the level of information security in an organization. It is an independent review and examination of system records, activities, and related documents. These audits are intended to improve the level of i ...
of Nym to identify potential vulnerabilities. In January 2022, she joined the Nym development team as a security consultant and
public relations
Public relations (PR) is the practice of managing and disseminating information from an individual or an organization (such as a business, government agency, or a nonprofit organization) to the public in order to influence their perception. Pu ...
advisor.
The launch of the live Nym network took place on April 14, 2022, at
Station F
Station F is a business incubator for startups, located in 13th arrondissement of Paris, near Bibliothèque nationale de France–Site François Mitterrand. It is noted as the world's largest startup facility.
Situated in a former rail freight ...
in
Paris
Paris () is the Capital city, capital and List of communes in France with over 20,000 inhabitants, largest city of France. With an estimated population of 2,048,472 residents in January 2025 in an area of more than , Paris is the List of ci ...
, with
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs.
Born in 1983 in Elizabeth ...
as a keynote speaker. In June 2022, Claudia Diaz, Harry Halpin, and Aggelos Kiayias introduced a reward-sharing scheme designed to incentivize operators within mix networks. As of February 2025, the Nym mixnet remains under active development.
The project continues to be developed in collaboration with research institutions, such as
KU Leuven
KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries.
In addition to its mai ...
(through the COSIC
research group) and
EPFL (via the SPRING
lab). Several other research teams working on privacy-enhancing technologies, cryptography, and decentralized systems have published research articles covering the Nym mixnet design.
Stakeholders
Nym is structured around a
mix network
Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
architecture
Architecture is the art and technique of designing and building, as distinguished from the skills associated with construction. It is both the process and the product of sketching, conceiving, planning, designing, and construction, constructi ...
,
incorporating three primary roles: users, node operators, and validators. The network operates on an incentive-driven economic model designed to maintain its functionality and decentralization.
* Users send
network traffic Network traffic or data traffic is the amount of data moving across a network at a given point of time. Network data in computer networks is mostly encapsulated in network packets, which provide the load in the network. Network traffic is the main ...
through Nym to enhance the privacy of their online activities and communications.
* Node operators manage two types of node roles:
**
Gateways act as entry and exit points to the network. They verify whether a user has access credentials and forward packets either to the inner "mix nodes" (entry gateways) or to the
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
(exit gateways).
** Mix nodes, which process traffic by
decrypting and mixing packets before forwarding them, ensuring that communication patterns are obfuscated.
* Anyone with technical expertise can download the Nym server software and become an operator, similar to how
Tor relays function. A decentralized reward and
reputation system
A reputation system is a program or algorithm that allow users of an online community to rate each other in order to build trust (social sciences), trust through reputation. Some common uses of these systems can be found on E-commerce websites s ...
is used to monitor operators' with the goal of promoting network stability and efficiency.
* Validators maintain a
distributed ledger
A distributed ledger (also called a shared ledger or distributed ledger technology or DLT) is a system whereby replicated, shared, and synchronized digital data is geographically spread (distributed) across many sites, countries, or institutions. I ...
that stores public information about active nodes and their rewards. They also issue
anonymous access credentials using
zero-knowledge proof
In cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the verifier) that some given statement is true, without conveying to the verifier any information ...
s and
digital signatures, allowing users to authenticate without revealing their identity.
A utility token serves two primary purposes:
# Compensating operators and validators for contributing to
network infrastructure
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
, ensuring the network adapts to user demand.
# Maintaining network quality through:
#* A reputation system that prioritizes high-performance operators based on
reliability
Reliability, reliable, or unreliable may refer to:
Science, technology, and mathematics Computing
* Data reliability (disambiguation), a property of some disk arrays in computer storage
* Reliability (computer networking), a category used to des ...
, speed, and
latency.
#* Mitigation of
Sybil attack
A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is ...
s by making it resource-intensive for malicious entities to gain control over a significant portion of the network.
This architecture is designed to support a decentralized
governance
Governance is the overall complex system or framework of Process, processes, functions, structures, Social norm, rules, Law, laws and Norms (sociology), norms born out of the Interpersonal relationship, relationships, Social interaction, intera ...
model, where incentives align with
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
preservation and network security.
Technical architecture
Access control
Initial access to the network is managed through anonymous access credentials which usage unlinkable from payment and
digital signatures. This
cryptographic
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
approach enables users to
authenticate
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating ...
their access rights to each
node
In general, a node is a localized swelling (a "knot") or a point of intersection (a vertex).
Node may refer to:
In mathematics
* Vertex (graph theory), a vertex in a mathematical graph
*Vertex (geometry), a point where two or more curves, lines ...
without disclosing any
identifiable information, thereby enhancing the network's
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
.
Network architecture with dynamic reconfiguration
The Nym mixnet consists of a five-layer network architecture, maintained by independent
node
In general, a node is a localized swelling (a "knot") or a point of intersection (a vertex).
Node may refer to:
In mathematics
* Vertex (graph theory), a vertex in a mathematical graph
*Vertex (geometry), a point where two or more curves, lines ...
operators.
* Entry gateways: The first layer consists of entry
gateways, which serve as access point to the network. Users can select a gateway based on criteria such as reputation, performance, or geographic location.
* Three layers of mix nodes: The core of the mixnet consists of three layers of mix nodes, structured in a stratified architecture. This design is intended to balance
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
protection, network
resilience
Resilience, resilient, or resiliency may refer to:
Science
Ecology
* Ecological resilience, the capacity of an ecosystem to recover from perturbations
** Climate resilience, the ability of systems to recover from climate change
** Soil resilien ...
, and efficiency in maintaining inter-node connections.
* Exit gateways: The final layer consists of exit gateways, which forward traffic to the public
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. Users can select an exit gateway similarly to how they choose an entry one.
The
topology
Topology (from the Greek language, Greek words , and ) is the branch of mathematics concerned with the properties of a Mathematical object, geometric object that are preserved under Continuous function, continuous Deformation theory, deformat ...
of the three mixing layers is updated hourly to improve privacy. Before the start of each epoch:
* A subset of mix nodes is selected to route network traffic, based on a
reputation system
A reputation system is a program or algorithm that allow users of an online community to rate each other in order to build trust (social sciences), trust through reputation. Some common uses of these systems can be found on E-commerce websites s ...
that evaluates quality of service metrics.
* The selected nodes are then
randomly
In common usage, randomness is the apparent or actual lack of definite pattern or predictability in information. A random sequence of events, symbols or steps often has no order and does not follow an intelligible pattern or combination. In ...
assigned to different layers, reducing the risk of malicious actors strategically positioning themselves within the network to monitor or manipulate traffic.
Privacy-preserving mechanisms
Nym employs several
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
-enhancing techniques to protect both the content of communications and associated
metadata
Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including:
* Descriptive ...
.
Metadata can reveal
information
Information is an Abstraction, abstract concept that refers to something which has the power Communication, to inform. At the most fundamental level, it pertains to the Interpretation (philosophy), interpretation (perhaps Interpretation (log ...
about user activity and communication patterns, making it a target for
traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
and
mass surveillance
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
. The mixnet aims to resist global adversaries with significant resources, including those capable of network-wide monitoring,
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
, advanced
statistical analysis
Statistical inference is the process of using data analysis to infer properties of an underlying probability distribution.Upton, G., Cook, I. (2008) ''Oxford Dictionary of Statistics'', OUP. . Inferential statistical analysis infers properties of ...
, or active participation through malicious nodes.
* Uniform packet size: Messages transmitted through the mixnet are divided into fixed-size
packets using the "Sphinx"
packet format. Standardizing packet sizes helps prevent
traffic correlation attacks based on message length.
* Layered encryption: Similar to
onion encryption in Tor, each packet is encapsulated in five layers of
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
. As packets traverse the network, each
node
In general, a node is a localized swelling (a "knot") or a point of intersection (a vertex).
Node may refer to:
In mathematics
* Vertex (graph theory), a vertex in a mathematical graph
*Vertex (geometry), a point where two or more curves, lines ...
decrypts only its assigned layer before forwarding the packet. The final node in the sequence is the only one that knows the ultimate destination of the packet.
* Randomized packet transmission: Packets are emitted by the user at random intervals, following a
Poisson process
In probability theory, statistics and related fields, a Poisson point process (also known as: Poisson random measure, Poisson random point field and Poisson point field) is a type of mathematical object that consists of Point (geometry), points ...
.
* Cover traffic injection: Users generate and send dummy packets to accompany real messages. This prevents adversaries from identifying active communication and makes correlation attacks more difficult.
* Temporal reordering at mix nodes: Following the standard
mix network
Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
model, each mix node introduces random delays (following an
exponential distribution
In probability theory and statistics, the exponential distribution or negative exponential distribution is the probability distribution of the distance between events in a Poisson point process, i.e., a process in which events occur continuousl ...
) and reorders packets before forwarding, rather than forwarding them when they become available. This also aims to disrupt timing correlation between packet input and output, making traffic analysis more challenging.
Cryptographic mechanisms
Nym employs
open-source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
cryptographic
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
protocols such as
WireGuard and the
Noise Protocol Framework to enable secure and anonymous packet transmission. The client establishes a secure communication channel with an entry
gateway and then
encrypts
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plain ...
each packet in five layers—one for the exit gateway, three for the mix nodes, and one for the entry gateway. As the packet traverses the network, each node decrypts only its designated layer, before forwarding it to the next
node
In general, a node is a localized swelling (a "knot") or a point of intersection (a vertex).
Node may refer to:
In mathematics
* Vertex (graph theory), a vertex in a mathematical graph
*Vertex (geometry), a point where two or more curves, lines ...
.
To initiate communication, the client selects an entry gateway and establishes a secure channel using:
*
X25519
X, or x, is the twenty-fourth letter of the Latin alphabet, used in the English alphabet, modern English alphabet, the alphabets of other western European languages and others worldwide. Its name in English is Wikt:ex#English, ''ex'' (pro ...
, an
Elliptic Curve Diffie-Hellman (ECDH)
key exchange
Key exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.
If the sender and receiver wish to exchange encrypted messages, each m ...
protocol, used for confidential key agreement.
*
Ed25519
In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on twisted Edwards curves.
It is designed to be faster than existing digital signature scheme ...
, a
digital signature scheme, which ensures the authenticity of the connection.
Before transmission, the client encrypts each packet in five successive layers, corresponding to the nodes it will traverse:
* Three mix nodes and exit gateway: A four-layer "Sphinx"
packet encryption:
** Packet headers are encrypted using
AES-CTR
In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authentication, authenticity.
A block cipher by itself is only suitable for the secure cryptogr ...
(stream cipher mode).
** Packet contents are encrypted using Lioness Wide Block Cipher.
* Entry gateway: The outermost encryption layer is secured using
AES-GCM
In cryptography, Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance. GCM throughput rates for state-of-the-art, high-speed communication channels can be achie ...
256-bit for confidentiality and integrity purposes.
According to Nym’s 2025 roadmap, plans exist to integrate
post-quantum cryptographic resistance as the development team has proposed replacing the Sphinx packet format with a new, lighter format known as “Outfox”, which is intended to optimize network efficiency while maintaining strong
anonymity
Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
guarantees.
Research and Development (R&D)
The mixnet originates from
academic research
Research is creative and systematic work undertaken to increase the stock of knowledge. It involves the collection, organization, and analysis of evidence to increase understanding of a topic, characterized by a particular attentiveness to ...
, with technologies associated with the project regularly presented at
scientific conferences in cybersecurity and cryptography, including
USENIX
USENIX is an American 501(c)(3) nonprofit membership organization based in Berkeley, California and founded in 1975 that supports advanced computing systems, operating system (OS), and computer networking research. It organizes several confe ...
,
NDSS,
and Privacy Enhancing Technologies Symposium (PETS).
The project continues to be developed in collaboration with research institutions, such as
KU Leuven
KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries.
In addition to its mai ...
(through the COSIC
research group) and
EPFL (via the SPRING
lab). Several other research teams working on privacy-enhancing technologies, cryptography, and decentralized systems have published research articles covering the Nym mixnet design.
The development of Nym is guided by a scientific
advisory board
An advisory board is a body that provides non-binding strategic advice to the management of a corporation, organization, or foundation. The informal nature of an advisory board gives greater flexibility in structure and management compared to the ...
and external advisors,
comprising researchers and practitioners in
computer science
Computer science is the study of computation, information, and automation. Computer science spans Theoretical computer science, theoretical disciplines (such as algorithms, theory of computation, and information theory) to Applied science, ...
,
networking
Network, networking and networked may refer to:
Science and technology
* Network theory, the study of graphs as a representation of relations between discrete objects
* Network science, an academic field that studies complex networks
Mathematics
...
,
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
, and
privacy protection Privacy engineering is an emerging field of engineering which aims to provide methodologies, tools, and techniques to ensure systems provide acceptable levels of privacy. Its focus lies in organizing and assessing methods to identify and tackle priv ...
. Notable members include :
*
Karthikeyan Bhargavan, a former
INRIA
The National Institute for Research in Digital Science and Technology (Inria) () is a French national research institution focusing on computer science and applied mathematics.
It was created under the name French Institute for Research in Comp ...
researcher, known for his contributions to
TLS 1.3 and
IETF
The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
standardization efforts. He was a co-recipient of the
Levchin Prize
The Levchin Prize for real-world cryptography is a prize given to people or organizations who are recognized for contributions to cryptography that have a significant impact on its practical use. The recipients are selected by the steering commit ...
in 2016 for his work on TLS.
*
Daniel J. Bernstein, a mathematician and cryptographer affiliated with the
University of Illinois Chicago
The University of Illinois Chicago (UIC) is a public research university in Chicago, Illinois, United States. Its campus is in the Near West Side community area, adjacent to the Chicago Loop. The second campus established under the Universi ...
and
Ruhr University Bochum
The Ruhr University Bochum (, ) is a public research university located in the southern hills of the central Ruhr area, Bochum, Germany. It was founded in 1962 as the first new public university in Germany after World War II. Instruction began ...
. He has contributed to the development of several cryptographic primitives, including
X25519
X, or x, is the twenty-fourth letter of the Latin alphabet, used in the English alphabet, modern English alphabet, the alphabets of other western European languages and others worldwide. Its name in English is Wikt:ex#English, ''ex'' (pro ...
,
Ed25519
In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on twisted Edwards curves.
It is designed to be faster than existing digital signature scheme ...
,
ChaCha20
Salsa20 and the closely related ChaCha are stream ciphers developed by Daniel J. Bernstein. Salsa20, the original cipher, was designed in 2005, then later submitted to the eSTREAM European Union cryptographic validation process by Bernstein. Ch ...
,
SipHash
SipHash is an add–rotate–xor (ARX) based family of pseudorandom functions created by Jean-Philippe Aumasson and Daniel J. Bernstein in 2012, in response to a spate of "hash flooding" denial-of-service attacks (HashDoS) in late 2011.
SipHash ...
, Streamlined
NTRU
NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures. Unlike ...
Prime, and Classic McEliece, a post-quantum
Key Encapsulation Mechanism
In cryptography, a key encapsulation mechanism (KEM) is a public-key cryptosystem that allows a sender to generate a short secret key and transmit it to a receiver securely, in spite of eavesdropping and intercepting adversaries. Modern standar ...
(KEM).
*
George Danezis, a researcher specializing in anonymous communications and security, affiliated with
University College London
University College London (Trade name, branded as UCL) is a Public university, public research university in London, England. It is a Member institutions of the University of London, member institution of the Federal university, federal Uni ...
and the
Alan Turing Institute
The Alan Turing Institute is the United Kingdom's national institute for data science and artificial intelligence, founded in 2015 and largely funded by the UK government. It is named after Alan Turing, the British mathematician and computing p ...
.
*
Aggelos Kiayias
Aggelos Kiayias () is a Greek cryptographer and computer scientist, is a professor at the University of Edinburgh and the chief science officer at Input Output Global (formerly IOHK), the blockchain company that developed Cardano.
Education ...
, a cryptographer and professor at the University of Edinburgh, known for his work on the
Cardano blockchain, the
Ouroboros
The ouroboros or uroboros (; ) is an ancient symbol depicting a serpent symbolism, snake or European dragon, dragon Autocannibalism, eating its own tail. The ouroboros entered Western tradition via Egyptian mythology, ancient Egyptian iconogra ...
proof-of-stake
Proof-of-stake (PoS) protocols are a class of consensus mechanisms for blockchains that work by selecting validators in proportion to their quantity of holdings in the associated cryptocurrency. This is done to avoid the computational cost of ...
protocol, and
electronic voting
Electronic voting is voting that uses electronic means to either aid or handle casting and counting ballots including voting time.
Depending on the particular implementation, e-voting may use standalone '' electronic voting machines'' (also ...
systems. He was a co-recipient of the
Lovelace Medal
The Lovelace Medal was established by BCS, The Chartered Institute for IT in 1998, and is presented to individuals who have made outstanding contributions to the understanding or advancement of computing. It is the top award in computing in the U ...
in 2024.
*
Ben Laurie
Ben Laurie is an English software engineer.
Laurie wrote Apache-SSL, the basis of most SSL-enabled versions of the Apache HTTP Server. He developed the MUD ''Gods'', which was innovative in including online creation in its endgame.
Laurie also ...
, a founding member of the
Apache Software Foundation
The Apache Software Foundation ( ; ASF) is an American nonprofit corporation (classified as a 501(c)(3) organization in the United States) to support a number of open-source software projects. The ASF was formed from a group of developers of the ...
, contributor to
OpenSSL
OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end. It is widely used by Internet servers, including the majority of HTTPS web ...
and
FreeBSD
FreeBSD is a free-software Unix-like operating system descended from the Berkeley Software Distribution (BSD). The first version was released in 1993 developed from 386BSD, one of the first fully functional and free Unix clones on affordable ...
, and a former associate of
WikiLeaks
WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
. He was a co-recipient of the
Levchin Prize
The Levchin Prize for real-world cryptography is a prize given to people or organizations who are recognized for contributions to cryptography that have a significant impact on its practical use. The recipients are selected by the steering commit ...
in 2024 for his work on
Certificate Transparency
Certificate Transparency (CT) is an Internet security standard for monitoring and auditing the issuance of digital certificates. When an internet user interacts with a website, a trusted third party is needed for assurance that the website is leg ...
.
*
Bart Preneel
Bart Preneel (born 15 October 1963 in Leuven, Belgium) is a Belgium, Belgian cryptographer and cryptanalyst. He is a professor at Katholieke Universiteit Leuven, in the COSIC group.
He was the president of the International Association for Crypt ...
, a cryptographer at KU Leuven, co-designer of cryptographic functions, including the
Miyaguchi-Preneel construction,
RIPEMD
RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other variants). There are five functions in the family: RIPEMD, RIPEMD-128, RIPEMD-160, RIPEMD-256, and RIPEMD-320, of ...
hash function, and the
MUGI
In cryptography, MUGI is a pseudorandom number generator (PRNG) designed for use as a stream cipher. It was among the cryptographic techniques recommended for Japanese government use by CRYPTREC in 2003, however, has been dropped to "candidate" ...
pseudo-random number generator. He is a former president of the
International Association for Cryptologic Research
The International Association for Cryptologic Research (IACR) is a non-profit scientific organization that furthers research in cryptology and related fields. The IACR was organized at the initiative of David Chaum at the CRYPTO '82 conference. ...
(IACR).
*
Carmela Troncoso
Carmela González Troncoso (born 1982 in Vigo) is a Spanish telecommunication engineer and researcher specialized in privacy issues, and an LGBT+ activist. She is currently an associate professor at École Polytechnique Fédérale de Lausanne ...
, a professor of computer security and privacy at EPFL, known for her contributions to
privacy-enhancing technologies
Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their ...
.
Practical considerations
User experience
Users can access the Nym mixnet through the "NymVPN" client, which is available with both a
graphical interface
A graphical user interface, or GUI, is a form of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation. In many applications, GUIs are used instead of te ...
and a
command-line interface
A command-line interface (CLI) is a means of interacting with software via command (computing), commands each formatted as a line of text. Command-line interfaces emerged in the mid-1960s, on computer terminals, as an interactive and more user ...
, or by integrating the network into third-party applications using
software development kit
A software development kit (SDK) is a collection of software development tools in one installable package. They facilitate the creation of applications by having a compiler, debugger and sometimes a software framework. They are normally specific t ...
s (SDKs). The privacy features of Nym share similarities with
Virtual Private Networks
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not c ...
(VPNs) and
Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
, particularly in masking the user’s
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
and obfuscating their location. Additionally, Nym is designed to conceal
metadata
Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including:
* Descriptive ...
, a factor often exploited in
mass surveillance
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
and
traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
systems.
Adoption challenges
Independent tests conducted by
technology media in 2024–2025 indicate that, in practice, the Nym mixnet introduces noticeable
latency, which limits its suitability for real-time applications and mainstream adoption–unlike more widely used privacy-enhancing technologies developed over the past decade, such as
Brave
Brave(s) or The Brave(s) may refer to:
Common meanings
*Brave, an adjective for one who possesses courage
* Braves (Native Americans), a Euro-American stereotype for Native American warriors
Film and television
* ''Brave'' (1994 film), a concept ...
for private
browsing
Browsing is a kind of orienting strategy. It is supposed to identify something of relevance for the browsing organism. In context of humans, it is a metaphor taken from the animal kingdom. It is used, for example, about people browsing open sh ...
,
Proton Mail
Proton Mail is a Swiss end-to-end encrypted email service launched in 2014 and operated by Proton AG, which also operates Proton VPN, Proton Drive, Proton Calendar, Proton Pass and Proton Wallet. Proton AG is owned by the nonprofit Proton ...
for encrypted email, and
DuckDuckGo
DuckDuckGo is an American software company focused on online privacy whose flagship product is a search engine named DuckDuckGo. Founded by Gabriel Weinberg in 2008, its later products include browser extensions and a custom DuckDuckGo web ...
for anonymous
search
Searching may refer to:
Music
* "Searchin', Searchin", a 1957 song originally performed by The Coasters
* Searching (China Black song), "Searching" (China Black song), a 1991 song by China Black
* Searchin' (CeCe Peniston song), "Searchin" (C ...
. Mixnets are considered more appropriate for latency-tolerant use cases, such as
messaging
A message is a unit of communication that conveys information from a sender to a receiver. It can be transmitted through various forms, such as spoken or written words, signals, or electronic data, and can range from simple instructions to co ...
,
emailing,
data transfers,
batch processing
Computerized batch processing is a method of running software programs called jobs in batches automatically. While users are required to submit the jobs, no other interaction by the user is required to process the batch. Batches may automatically ...
, and
IoT applications.
Privacy properties
While the Nym mixnet aims to offer enhanced privacy features, researchers acknowledge that
privacy-enhancing technologies
Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their ...
and surveillance methods evolve over time, leading to a continuous adaptation between anonymization techniques and traffic analysis strategies.
An
emerging technology
Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized. These technologies are generally new but also include old technologies finding new applications. Emerging technologies are o ...
, mixnets such as Nym have yet to be extensively validated on a large scale.
More specifically,
research
Research is creative and systematic work undertaken to increase the stock of knowledge. It involves the collection, organization, and analysis of evidence to increase understanding of a topic, characterized by a particular attentiveness to ...
has identified several potential vulnerabilities in the “Loopix” mixnet architecture, which serves as the foundation for Nym. These concerns include susceptibility to
traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
, the possibility for entry
gateways to discern user information, the substantial amount of cover traffic required to ensure the claimed privacy properties, and the risks of exposure to malicious service providers, including complete paths being compromised.
Security properties
The Nym software, which powers the network, is
open-source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
and distributed under the
GPLv3
The GNU General Public Licenses (GNU GPL or simply GPL) are a series of widely used free software licenses, or ''copyleft'' licenses, that guarantee end users the freedom to run, study, share, or modify the software. The GPL was the first ...
license
A license (American English) or licence (Commonwealth English) is an official permission or permit to do, use, or own something (as well as the document of that permission or permit).
A license is granted by a party (licensor) to another part ...
. Its
source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
is publicly available on
GitHub
GitHub () is a Proprietary software, proprietary developer platform that allows developers to create, store, manage, and share their code. It uses Git to provide distributed version control and GitHub itself provides access control, bug trackin ...
, allowing for independent review and
audits
An audit is an "independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form when such an examination is conducted with a view to express an opinion thereon." Auditing al ...
by the security community. Nym has undergone several security audits, including by cryptographer
Jean-Philippe Aumasson (2021), Oak Security (2023), Cryspen (2023–2024) and
Cure53
Cure53 is a German cybersecurity firm. The company was founded by Mario Heiderich, a security researcher.
History
After a report from Cure53 on the South Korean security app Smart Sheriff, that described the app's security holes as "catastrop ...
(2024).
However, it does not currently have a public
bug bounty program
A bug bounty program is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security vulnerabilities. If no fin ...
to encourage the reporting of
vulnerabilities
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
.
Energy consumption
Mix networks enhance user privacy by employing multi-layered encryption and routing data through 5-hop connections. This process introduces additional computational overhead compared to single-hop connections, increasing
energy consumption
Energy consumption is the amount of energy used.
Biology
In the body, energy consumption is part of energy homeostasis. It derived from food energy. Energy consumption in the body is a product of the basal metabolic rate and the physical acti ...
. The generation of cover traffic—artificial packets designed to obfuscate real data flows—further increases
data transmission
Data communication, including data transmission and data reception, is the transfer of data, signal transmission, transmitted and received over a Point-to-point (telecommunications), point-to-point or point-to-multipoint communication chann ...
volumes and energy usage. Some analyses suggest that this overhead could be up to ten times greater than that of traditional internet traffic.
See also
*
Anonymous P2P
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routin ...
*
Crypto-anarchism
Crypto-anarchy, crypto-anarchism, cyberanarchy or cyberanarchism is a political ideology focusing on the protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and se ...
*
Darknet
A darknet or dark net is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social n ...
*
Freedom of information
*
Internet censorship circumvention
Internet censorship circumvention is the use of various methods and tools to bypass internet censorship. Commonly used tools include Lantern and Psiphon, which bypass multiple safeguard types. Some methods use alternate DNS servers, false addr ...
*
Internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. P ...
*
Mix network
Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
References
External links
*
External links
*
*
{{Portal bar, Free and open-source software , Freedom of speech , Internet
2020 software
Application layer protocols
Computer networking
Free software programmed in Rust
File sharing
Free routing software
Internet privacy software
Internet security
Overlay networks
Proxy servers
Mix networks