v3.3.0 — 30-Layer Post-Quantum Stack • KOMM Chat • SEVA NPU Compute • SANGHA Security

YAKMESH™

Sturdy & Secure

Yielding Atomic Kernel Modular Encryption Secured Hub

A self-verifying P2P mesh network with 162-trit quantum identity, hardware-accelerated cryptography across GPU+NPU, and mathematical consensus — no central servers, no certificate authorities, no trust assumptions.

30-layer security stack. 117 TOPS heterogeneous compute. PRAHARI v3 sponge hashing. AGUWA phase coupling. Every byte provable.

AGPL-3.0 Licensed
Post-Quantum
Self-Verifying

The Parable of the Sherpa Guide

Why we build the way we build

In the high passes of the Himalayas, climbers do not question whether the Sherpa knows the mountain. The Sherpa does not claim authority by certificate or credential. The Sherpa proves knowledge by walking the path.

When the storm comes and the trail vanishes, the Sherpa does not consult a distant committee. The Sherpa reads the snow, the wind, the angle of the ice. The mountain itself is the arbiter.

So it is with YAKMESH. We do not ask you to trust a certificate authority in a distant land. We do not ask you to believe our servers are honest. We ask only that you verify the mathematics.

The code IS the Sherpa. The math IS the mountain. The proof IS the path.

NAMCHE
The Gateway
DOKO
The Identity
SHERPA
The Guide
NAKPAK
The Porter
ANNEX
The Channel

The Y.A.K.M.E.S.H. Philosophy

Every letter represents a core principle

Y

Yielding

Not brittle; flexible enough to absorb network shocks

A

Atomic

Grounded in the absolute truth of physical time

K

Kernel

The essential, innermost part of the secure stack

M

Modular

Swap out encryption primitives or transport layers as tech evolves

E

Encryption

Privacy and integrity by default

S

Secured

Hardened against both classical and quantum vectors

H

Hub

A nexus for decentralized data and peer-to-peer logic

Built for the Future

YAKMESH combines post-quantum cryptography with a self-verifying oracle for truly decentralized applications.

Post-Quantum Security

ML-DSA-65 signatures (NIST FIPS 204) protect against both classical and quantum attacks.

Self-Verifying Oracle

Deterministic validation without external trust. The code IS the authority.

P2P Mesh Network

WebSocket-based gossip protocol with automatic peer discovery and message propagation.

ANNEX Encrypted P2P

Autonomous Network Negotiated eXchange — ML-KEM768 channels with perfect forward secrecy.

SHERPA Discovery

Decentralized peer discovery with RTT geo-proofing. Protocol v1.1 measures round-trip time for physics-based verification.

Enhanced in v3.3.0

NAKPAK Onion Routing

Post-quantum anonymous routing. Messages traverse multiple relays with layered encryption.

Core Module

Geographic Exclusion

Physics don't lie — speed-of-light RTT measurements prove minimum node distances. Sybil defense meets physics.

Enhanced in v3.3.0

Precision Timing

Support for atomic clocks, GPS, PTP (Meinberg PTP270PEX), and NTP with automatic detection.

Plugin Architecture

BaseAdapter pattern for integrating any database, API, or platform. Build your own adapters.

NAMCHE Gateway

7-gate mathematical verification. No human CA — pure cryptographic proof of identity.

Core

DOKO Identity

Distributed Ownership & Key Object — self-sovereign identity with mesh-verified domain claims.

Core

Phase Modulation

Time-based fingerprints provide anti-replay protection and temporal verification.

1,535 Tests

Comprehensive mesh, security, and protocol test coverage ensuring production reliability across all 30 layers.

v3.3.0

Structured Logging

Namespace-based logging with configurable levels for debugging and production monitoring.

Core

KOMM Stack

Complete communications layer — KATHA chat, VANI voice/video, YURT rooms, GUMBA access control. Discord-like features over post-quantum mesh.

New in v3.3.0

GPU + NPU Acceleration

ComputeScheduler routes crypto to the fastest silicon — 117 TOPS combined (RTX 3060 GPU + XDNA NPU). SHA3, ML-DSA-65, ONNX inference.

New in v3.3.0

SANGHA Security

Components protect each other through mutual attestation. 10 components, 45 synapses, circulating antibody verification every 5 seconds.

New in v3.3.0

SEVA Compute

Distributed NPU inference across the mesh. Share GPU/NPU compute with peers — ONNX models route to the fastest available silicon.

New in v3.3.0

Quick Start

Get up and running in under 5 minutes

1

Install the package

npm install yakmesh
2

Create configuration

// yakmesh.config.js
export default {
  port: 3000,
  peers: ['ws://node2.example.com:3000'],
  oracle: {
    timeSource: 'auto',  // Detects best available
    phaseWindow: 30000   // 30 second phases
  }
};
3

Start the node

npx yakmesh start

Your node is now running and will automatically connect to peers!

Architecture

Five layers, thirty protocols, zero trust assumptions

Oracle Layer

GPS/PCIe atomic time, phase epochs, codebase hash identity

Mesh Layer

WebSocket P2P, SHERPA discovery, gossip protocol, ANNEX E2E channels

Security Layer

162T identity, AGUWA phase coupling, SANGHA attestation, SAKSHI anomaly ML

KOMM Layer

KATHA chat, VANI voice/video, YURT rooms, GUMBA access control, DARSHAN streaming

Adapter Layer

BaseAdapter interface, website hosting, platform integrations

By the Numbers

Not promises — provable facts baked into every node

162T
Ternary identity trits
256-bit quantum security
117
TOPS compute
GPU + NPU heterogeneous
30
Security layers
NAMCHE 7-gate validation
3
ONNX ML models
Entropy, anomaly, trust
48
Spec invariants
Runtime provable logic
65
Protected JS files
Oracle hash-locked
18
Named protocols
Himalayan naming
0
Trust assumptions
Math proves everything

Get Started Today

YAKMESH is now available on npm. Install and start building.

npm install yakmesh

Ready to Build?

Start building decentralized applications with post-quantum security today.