End-to-End Encrypted Communication
The Neuronum SDK is powered by an end-to-end encrypted communication protocol based on public/private key pairs derived from a randomly generated 12-word mnemonic. All data is relayed through neuronum.net, providing secure communication without the need to set up public web servers or expose your infrastructure to the public internet.
How It Works
1. Cell Creation & Key Generation
When you create a Neuronum Cell, a cryptographically secure 12-word mnemonic phrase is randomly generated. This mnemonic serves as the seed for deriving your public/private key pair.
- Private Key: Stored locally on your device and never transmitted
- Public Key: Registered with the Neuronum network as your Cell identity
- Mnemonic: Your recovery phrase for regenerating keys on new devices
2. End-to-End Encryption
All messages sent through the Neuronum network are encrypted before transmission and can only be decrypted by the intended recipient:
- Messages are encrypted using the recipient's public key
- Only the recipient's private key can decrypt the message
- The Neuronum relay server (neuronum.net) cannot read message contents
- Your data remains private even as it passes through the network infrastructure
3. Relay Architecture
Instead of requiring you to configure firewalls, port forwarding, or public IP addresses, Neuronum uses a relay architecture:
- Both clients and servers connect outbound to neuronum.net
- The relay server forwards encrypted messages between your client and agent
- No need to expose your Agent or infrastructure to the public internet
- Works seamlessly behind NAT, firewalls, and corporate networks
Security Benefits
Privacy by Design
- Zero-Knowledge Architecture: The relay server never has access to message contents
- Client-Side Encryption: All encryption/decryption happens on your local device
- No Metadata Collection: Minimal metadata is stored or logged
- Self-Custody: You control your private keys and recovery mnemonic
Network Security
- No Public Exposure: Your server remains behind your firewall
- No Port Forwarding: All connections are outbound from your network
- TLS Transport: Additional transport layer encryption for network traffic
- Secure by Default: No configuration needed to achieve secure communication
Recovery & Access Control
- Mnemonic Recovery: Restore your Cell on any device using your 12-word phrase
- Device Independence: Access your Agent from multiple devices with the same Cell
- Secure Backups: Your mnemonic is all you need to backup and restore access
Getting Started with Neuronum Cells
Create Your Cell
Creating a Cell generates your cryptographic identity:
neuronum create-cell
This command will:
- Generate a secure 12-word mnemonic phrase
- Derive your public/private key pair from the mnemonic
- Register your public key with the Neuronum network
- Store your encrypted private key locally
Important: Save your 12-word mnemonic phrase in a secure location. This is the only way to recover your Cell if you lose access to your device. Anyone with this phrase can access your Cell.
Connect Your Cell
Connect to the Neuronum network to start sending and receiving encrypted messages:
neuronum connect-cell
Need Help? For more information, visit the GitHub repository or contact us.