New Blog Post The Internet Is Becoming a Dark Forest — And AI Is the Hunter
IETF Internet-Draft Published
CSA Specification Released

The Protocol for the
Dark Forest Internet
in the AI Era

A cryptography-powered Zero Trust security protocol that hides your infrastructure from attackers. They can't attack what they can't find. Invisible until trusted.

13.8k+ GitHub Stars
2.5k+ Forks
<10ms Auth Latency
10k/s Throughput
Protocol Evolution

Third Generation of Network Hiding

From Port Knocking to SPA to NHP — the evolution of hiding network infrastructure from threats.

Generation 1

Port Knocking

Simple but insecure. Vulnerable to replay attacks and eavesdropping.

Generation 2

Single Packet Authorization (SPA)

Improved security with encrypted packets. Limited by shared secrets and scalability issues.

Generation 3 — Now

Network-Infrastructure Hiding Protocol (NHP)

Modern cryptography (Noise Protocol, ECC), mutual authentication, and enterprise-grade scalability. Hides domains, IPs, and ports completely.

NHP vs SPA

Feature SPA NHP
Cryptography Shared secrets Modern Cryptography Algorithms (e.g. Noise, IBC, etc)
Scalability Single-point bottleneck Stateless, infinitely scalable
Communication One-way Bi-directional with status
Hiding Capability Ports only Domain, IP, and ports
Extensibility Typically SDP All-purpose, customizable
Library C/C++ (memory-unsafe) Memory-safe Go (OpenNHP)
Integration Limited DNS, FIDO, IAM, Policy Engines
Key Features

Why OpenNHP?

Built for the AI era where attackers use LLMs to find and exploit vulnerabilities automatically.

🔒

Default-Deny Access

All resources are hidden by default. Only authenticated and authorized users can even discover that services exist.

👁️‍🗨️

Complete Infrastructure Hiding

Hide domains, IP addresses, and ports. Attackers can't attack what they can't find. NXDOMAIN for unauthorized queries.

High Performance

10K authentication requests per second with sub-10ms latency. Built with Go for memory safety and concurrency.

🔐

Modern Cryptography

Noise Protocol Framework, Curve25519, ChaCha20-Poly1305. Proven secure key exchange to prevent MITM attacks.

🌐

Flexible Deployment

Client-to-Gateway, Client-to-Server, Server-to-Server, Gateway-to-Gateway. Standalone to multi-tenant clusters.

🔗

Seamless Integration

Works with existing IAM, DNS, FIDO, and Zero Trust policy engines. Extends rather than replaces your security stack.

Ecosystem

Open Source Projects

A growing ecosystem of tools and implementations for Zero Trust network security.

🛡️

OpenNHP Core

Reference Implementation

The official NHP protocol implementation in Go. Includes nhp-agent, nhp-server, and nhp-ac components for complete Zero Trust deployments.

Go Linux Windows macOS
View on GitHub
🌐

StealthDNS

Zero Trust DNS Client

A DNS client powered by OpenNHP that implements invisible DNS resolution. Protected domains return NXDOMAIN to unauthorized clients.

DNS Cross-Platform Mobile SDK
View on GitHub
📜

JS Agent

Browser NHP Client

JavaScript implementation of the NHP protocol for web applications. Enable Zero Trust access directly from the browser.

JavaScript TypeScript Browser
View on GitHub

Ready to Hide Your Infrastructure?

Join thousands of developers building Zero Trust security with OpenNHP.