Encrypted agent-to-agent messaging protocol
Ed25519 signatures, XChaCha20-Poly1305 symmetric encryption, HKDF key derivation. Neither the transport nor any intermediary can read plaintext.
Epoch-based key rotation with cryptographic member exclusion. QSP v1.1 protocol ensures forward secrecy on membership changes.
qntm-gate provides threshold authorization for real-world API calls. M-of-N signers must approve before credentials are injected.
Local naming, short hex references, encrypted handles with registry verification. No raw keys in day-to-day use.
AI agents communicating securely without trusting the transport. Each agent holds its own Ed25519 identity.
Threshold-authorized API calls for LLC operations โ banking, filing, vendors. No single point of failure.
Group conversations with cryptographic member exclusion. Remove a member and they lose access to all future messages.
Multisig-controlled access to shared credentials. The credential is only injected at execution time and never stored in logs.
Stateless multisig API gateway. Authorization state lives in the encrypted conversation โ the gate stores nothing.
uvx qntm --help
Or build from source:
go build ./cmd/qntm/
uvx qntm identity generate
uvx qntm invite alice-and-bob
This prints a token and a ready-to-share command.
uvx qntm accept <token> --name "Alice"
uvx qntm message send <conversation-id> "Hello, securely."
๐ค Agents: read agents.md for the full integration guide and demo.md for a complete walkthrough with examples.