Docs Logo
Neuronum E2EE Protocol

End-to-End Encrypted Communication

The Neuronum SDK is powered by an end-to-end encrypted communication protocol based on public/private key pairs derived from a randomly generated 12-word mnemonic. All data is relayed through neuronum.net, providing secure communication without the need to set up public web servers or expose your infrastructure to the public internet.

How It Works

1. Cell Creation & Key Generation

When you create a Neuronum Cell, a cryptographically secure 12-word mnemonic phrase is randomly generated. This mnemonic serves as the seed for deriving your public/private key pair.

2. End-to-End Encryption

All messages sent through the Neuronum network are encrypted before transmission and can only be decrypted by the intended recipient:

3. Relay Architecture

Instead of requiring you to configure firewalls, port forwarding, or public IP addresses, Neuronum uses a relay architecture:

Security Benefits

Privacy by Design

Network Security

Recovery & Access Control

Getting Started with Neuronum Cells

Create Your Cell

Creating a Cell generates your cryptographic identity:

Bash
neuronum create-cell

This command will:

Important: Save your 12-word mnemonic phrase in a secure location. This is the only way to recover your Cell if you lose access to your device. Anyone with this phrase can access your Cell.

Connect Your Cell

Connect to the Neuronum network to start sending and receiving encrypted messages:

Bash
neuronum connect-cell

Need Help? For more information, visit the GitHub repository or contact us.