ghost-link 10.0.0 → 12.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +73 -0
- package/ghost-link.js +1 -1
- package/package.json +15 -6
package/README.md
ADDED
|
@@ -0,0 +1,73 @@
|
|
|
1
|
+
# ◢◤ GHOST-LINK V.12
|
|
2
|
+
|
|
3
|
+
*Ghost-Link is a decentralized, peer-to-peer (P2P) terminal communication suite designed for secure, ephemeral, and encrypted data exchange. It operates without a central server, utilizing a Distributed Hash Table (DHT) to establish direct connections between nodes.*
|
|
4
|
+
|
|
5
|
+
# Key Features
|
|
6
|
+
|
|
7
|
+
**Serverless Protocol:** No central authority or data logging. Connections
|
|
8
|
+
are made node-to-node.
|
|
9
|
+
**AES-256-GCM Encryption**: Every session uses unique, cryptographically
|
|
10
|
+
derived keys to ensure end-to-end privacy.
|
|
11
|
+
**Ephemeral Identity:** No accounts and no traces. All session data is
|
|
12
|
+
stored in memory and wiped upon termination.
|
|
13
|
+
**Secure File Sync:** Integrated P2P file and directory sharing with
|
|
14
|
+
SHA-256 integrity verification.
|
|
15
|
+
**Dynamic Frequency Shifting:** Owners can shift the entire group to a new
|
|
16
|
+
room code instantly.
|
|
17
|
+
**Administrative Control:** The first node to initialize a frequency gains
|
|
18
|
+
Origin (Owner) status to lock rooms or manage peers.
|
|
19
|
+
|
|
20
|
+
# INSTALLATION & LAUNCH
|
|
21
|
+
|
|
22
|
+
*Ensure you have Node.js installed on your system.*
|
|
23
|
+
*Install the Ghost-Link suite globally via NPM : `npm i -g ghost-link`*
|
|
24
|
+
*Note: macOS/Linux users may require `sudo` for elevated privileges.*
|
|
25
|
+
|
|
26
|
+
**EXECUTION**
|
|
27
|
+
*To start the protocol, simply run the global command: ghost-link*
|
|
28
|
+
|
|
29
|
+
# HOW TO USE
|
|
30
|
+
|
|
31
|
+
**1. INITIALIZATION SEQUENCE**
|
|
32
|
+
Upon launch, the terminal will prompt you for two parameters:
|
|
33
|
+
**IDENT:** Enter your temporary alias (e.g., `Shadow`), or leave it
|
|
34
|
+
blank and press ENTER to generate a random alias.
|
|
35
|
+
**FREQ:** Enter a specific room code to join an existing session, or generate custom frequency in format **[X.XXX.XXX.XXX.XXX.XXX.X]**
|
|
36
|
+
(Example : *1.345.222.445.991.666.1*)
|
|
37
|
+
or leave it blank and press ENTER to generate a new, private frequency.
|
|
38
|
+
|
|
39
|
+
**2. MESSAGING & COMMANDS**
|
|
40
|
+
*Once the signal is stabilized, you can type messages normally or use specialized commands:*
|
|
41
|
+
`<help>` - Displays all available commands.
|
|
42
|
+
`<share> [path]`- Requests to send a file or folder to the peers.
|
|
43
|
+
`<reply:ID> [msg]`- Targets a specific message ID to create a threaded
|
|
44
|
+
reply.
|
|
45
|
+
`<peers>`- Lists all currently manifested nodes on the frequency.
|
|
46
|
+
`<clear>` - Wipes the current terminal chat history.
|
|
47
|
+
`<leave>`- Gracefully disconnects your node from the swarm.
|
|
48
|
+
|
|
49
|
+
**3. OWNER-ONLY COMMANDS (ORIGIN NODE)**
|
|
50
|
+
*The session creator has access to elevated protocol controls:*
|
|
51
|
+
`<lock>`: Prevents new nodes from joining the frequency.
|
|
52
|
+
`<unlock>`: Opens the frequency for new connections.
|
|
53
|
+
`<kick> .` : Opens a menu to terminate a specific peer's connection.
|
|
54
|
+
`<end>` : Sends a global kill-signal to dissolve the session for
|
|
55
|
+
everyone.
|
|
56
|
+
|
|
57
|
+
# FILE TRANSFERS
|
|
58
|
+
|
|
59
|
+
*Files are automatically saved to your system's default **Downloads** folder under a directory named **Ghost-Link**.*
|
|
60
|
+
|
|
61
|
+
**Integrity**: Files are hashed during transit. If the SHA-256 hash does not match upon arrival, the transfer is marked as corrupt.
|
|
62
|
+
|
|
63
|
+
**Directories**: Ghost-Link automatically packages, transfers, and extracts folders seamlessly.
|
|
64
|
+
|
|
65
|
+
# SECURITY ARCHITECTURE
|
|
66
|
+
|
|
67
|
+
Ghost-Link utilizes a **Zero-Trust** model:
|
|
68
|
+
|
|
69
|
+
**Key Derivation**: Room codes are processed via **scrypt** with a hard-coded salt to derive a 32-byte secret key.
|
|
70
|
+
|
|
71
|
+
**Packet Security**: Every message is a Buffer containing a 12-byte IV, a 16-byte Auth Tag, and the Encrypted Payload.
|
|
72
|
+
|
|
73
|
+
**Nonce Verification**: To prevent replay attacks, the system tracks and ignores duplicate nonces within a sliding window.
|