YAKMESH™
Sturdy & Secure
Yielding Atomic Kernel Modular Encryption Secured Hub
A self-verifying P2P mesh network with 162-trit quantum identity, hardware-accelerated cryptography across GPU+NPU, and mathematical consensus — no central servers, no certificate authorities, no trust assumptions.
30-layer security stack. 117 TOPS heterogeneous compute. PRAHARI v3 sponge hashing. AGUWA phase coupling. Every byte provable.
$ npm install yakmesh
$ npx yakmesh init
Yakmesh Network v3.3.0
Post-Quantum Secure • Decentralized • 117 TOPS
✓ Created data directory
✓ Created yakmesh.config.js
$ npx yakmesh start
Starting Yakmesh Node...
✓ Codebase locked: 65 files protected
✓ Oracle System initialized
✓ Annex channel initialized
✓ SHERPA discovery started
✓ Yakmesh Node is running!
Network: factor-primitive-bose
Peers: 3 discovered via SHERPA
Why YAKMESH?
In an era where traditional ECDSA is increasingly vulnerable and network jitter can desynchronize global state, YAKMESH offers a three-pillar solution.
Yielding Resilience
A self-healing mesh topology that adapts to node failure and adversarial interference without central authority.
Atomic Precision
Integrated support for PCIe atomic clock hardware, enabling nanosecond-level hardware timestamping for low-latency synchronization.
Quantum Hardened
162-trit ternary identity with 256-bit quantum security. PRAHARI SHA3-256 sponge derivations. YPC-27 checksums. ML-DSA-65 + ML-KEM-768 as NIST compliance layer.
The Parable of the Sherpa Guide
Why we build the way we build
In the high passes of the Himalayas, climbers do not question whether the Sherpa knows the mountain. The Sherpa does not claim authority by certificate or credential. The Sherpa proves knowledge by walking the path.
When the storm comes and the trail vanishes, the Sherpa does not consult a distant committee. The Sherpa reads the snow, the wind, the angle of the ice. The mountain itself is the arbiter.
So it is with YAKMESH. We do not ask you to trust a certificate authority in a distant land. We do not ask you to believe our servers are honest. We ask only that you verify the mathematics.
The code IS the Sherpa. The math IS the mountain. The proof IS the path.
The Y.A.K.M.E.S.H. Philosophy
Every letter represents a core principle
Yielding
Not brittle; flexible enough to absorb network shocks
Atomic
Grounded in the absolute truth of physical time
Kernel
The essential, innermost part of the secure stack
Modular
Swap out encryption primitives or transport layers as tech evolves
Encryption
Privacy and integrity by default
Secured
Hardened against both classical and quantum vectors
Hub
A nexus for decentralized data and peer-to-peer logic
Built for the Future
YAKMESH combines post-quantum cryptography with a self-verifying oracle for truly decentralized applications.
Post-Quantum Security
ML-DSA-65 signatures (NIST FIPS 204) protect against both classical and quantum attacks.
Self-Verifying Oracle
Deterministic validation without external trust. The code IS the authority.
P2P Mesh Network
WebSocket-based gossip protocol with automatic peer discovery and message propagation.
ANNEX Encrypted P2P
Autonomous Network Negotiated eXchange — ML-KEM768 channels with perfect forward secrecy.
SHERPA Discovery
Decentralized peer discovery with RTT geo-proofing. Protocol v1.1 measures round-trip time for physics-based verification.
Enhanced in v3.3.0NAKPAK Onion Routing
Post-quantum anonymous routing. Messages traverse multiple relays with layered encryption.
Core ModuleGeographic Exclusion
Physics don't lie — speed-of-light RTT measurements prove minimum node distances. Sybil defense meets physics.
Enhanced in v3.3.0Precision Timing
Support for atomic clocks, GPS, PTP (Meinberg PTP270PEX), and NTP with automatic detection.
Plugin Architecture
BaseAdapter pattern for integrating any database, API, or platform. Build your own adapters.
NAMCHE Gateway
7-gate mathematical verification. No human CA — pure cryptographic proof of identity.
CoreDOKO Identity
Distributed Ownership & Key Object — self-sovereign identity with mesh-verified domain claims.
CorePhase Modulation
Time-based fingerprints provide anti-replay protection and temporal verification.
1,535 Tests
Comprehensive mesh, security, and protocol test coverage ensuring production reliability across all 30 layers.
v3.3.0Structured Logging
Namespace-based logging with configurable levels for debugging and production monitoring.
CoreKOMM Stack
Complete communications layer — KATHA chat, VANI voice/video, YURT rooms, GUMBA access control. Discord-like features over post-quantum mesh.
New in v3.3.0GPU + NPU Acceleration
ComputeScheduler routes crypto to the fastest silicon — 117 TOPS combined (RTX 3060 GPU + XDNA NPU). SHA3, ML-DSA-65, ONNX inference.
New in v3.3.0SANGHA Security
Components protect each other through mutual attestation. 10 components, 45 synapses, circulating antibody verification every 5 seconds.
New in v3.3.0SEVA Compute
Distributed NPU inference across the mesh. Share GPU/NPU compute with peers — ONNX models route to the fastest available silicon.
New in v3.3.0Quick Start
Get up and running in under 5 minutes
Install the package
npm install yakmesh
Create configuration
// yakmesh.config.js
export default {
port: 3000,
peers: ['ws://node2.example.com:3000'],
oracle: {
timeSource: 'auto', // Detects best available
phaseWindow: 30000 // 30 second phases
}
};
Start the node
npx yakmesh start
Your node is now running and will automatically connect to peers!
Architecture
Five layers, thirty protocols, zero trust assumptions
Oracle Layer
GPS/PCIe atomic time, phase epochs, codebase hash identity
Mesh Layer
WebSocket P2P, SHERPA discovery, gossip protocol, ANNEX E2E channels
Security Layer
162T identity, AGUWA phase coupling, SANGHA attestation, SAKSHI anomaly ML
KOMM Layer
KATHA chat, VANI voice/video, YURT rooms, GUMBA access control, DARSHAN streaming
Adapter Layer
BaseAdapter interface, website hosting, platform integrations
By the Numbers
Not promises — provable facts baked into every node
Get Started Today
YAKMESH is now available on npm. Install and start building.
npm install yakmesh
Ready to Build?
Start building decentralized applications with post-quantum security today.