ghost-link
v15.0.9
Published
Secure, serverless P2P terminal chat protocol
Maintainers
Readme
◢◤ GHOST-LINK V.15.0.5
Ghost-Link is a decentralized, peer-to-peer (P2P) terminal communication suite designed for secure, ephemeral, and encrypted data exchange. It operates without a central server, utilizing a Distributed Hash Table (DHT) to establish direct connections between nodes.
Key Features
Serverless Protocol: No central authority or data logging. Connections are made node-to-node. AES-256-GCM Encryption: Every session uses unique, cryptographically derived keys to ensure end-to-end privacy. Ephemeral Identity: No accounts and no traces. All session data is stored in memory and wiped upon termination. Secure File Sync: Integrated P2P file and directory sharing with SHA-256 integrity verification. Dynamic Frequency Shifting: Owners can shift the entire group to a new room code instantly. Administrative Control: The first node to initialize a frequency gains Origin (Owner) status to lock rooms or manage peers.
INSTALLATION & LAUNCH
Ensure you have Node.js installed on your system.
Install the Ghost-Link suite globally via NPM : npm i -g ghost-link
Note: macOS/Linux users may require sudo for elevated privileges.
EXECUTION To start the protocol, simply run the global command: ghost-link
HOW TO USE
1. INITIALIZATION SEQUENCE
Upon launch, the terminal will prompt you for two parameters:
IDENT: Enter your temporary alias (e.g., Shadow), or leave it
blank and press ENTER to generate a random alias.
FREQ: Enter a specific room code to join an existing session, or generate custom frequency in format [X.XXX.XXX.XXX.XXX.XXX.X]
(Example : 1.345.222.445.991.666.1)
or leave it blank and press ENTER to generate a new, private frequency.
2. MESSAGING & COMMANDS
Once the signal is stabilized, you can type messages normally or use specialized commands:
<help> - Displays all available commands.
<share> [path]- Requests to send a file or folder to the peers.
<reply:ID> [msg]- Targets a specific message ID to create a threaded
reply.
<peers>- Lists all currently manifested nodes on the frequency.
<clear> - Wipes the current terminal chat history.
<leave>- Gracefully disconnects your node from the swarm.
3. OWNER-ONLY COMMANDS (ORIGIN NODE)
The session creator has access to elevated protocol controls:
<lock>: Prevents new nodes from joining the frequency.
<unlock>: Opens the frequency for new connections.
<kick> . : Opens a menu to terminate a specific peer's connection.
<end> : Sends a global kill-signal to dissolve the session for
everyone.
FILE TRANSFERS
Files are automatically saved to your system's default Downloads folder under a directory named Ghost-Link.
Integrity: Files are hashed during transit. If the SHA-256 hash does not match upon arrival, the transfer is marked as corrupt.
Directories: Ghost-Link automatically packages, transfers, and extracts folders seamlessly.
SECURITY ARCHITECTURE
Ghost-Link utilizes a Zero-Trust model to ensure digital sovereignty:
1. Key Derivation: Room codes are processed via scrypt with a hardened armor salt (v2 ghost-link-v15-hardened-armor-salt). The derivation uses a memory-hard cost factor (N: 65536) to effectively neutralize brute-force and hardware-accelerated attacks.
2. Packet Hardening: Every transmission is a cryptographically signed Buffer containing a 12-byte random IV and a 16-byte Auth Tag. To prevent delayed interception, the system implements a 60-second TTL (Time-To-Live); any packets exceeding this age are automatically rejected.
3.Replay Protection: The system maintains a sliding window of seenNonces. Duplicate nonces are identified and dropped instantly, preventing "Ghost-in-the-Middle" replay injections.
4. Rate Limiting: An autonomous Lockdown mechanism monitoring chat frequency. If a node exceeds 5 packets per 2 seconds, the terminal enters a 10-second freeze to protect the frequency from spam-based resource exhaustion.
ABOUT THIS PACKAGE
The "Shadow Network" Paradigm Ghost-Link represents a shift away from "Cloud-First" communication toward "Local-First" Sovereignty. While modern messengers claim encryption, they still rely on centralized servers to handshake connections and store metadata. Ghost-Link eliminates the middleman entirely. It doesn't just encrypt your data; it makes the data's path through the internet unpredictable and invisible to traditional monitoring.
Deep Intelligence & Autonomous Networking Beyond simple chat, Ghost-Link features an Autonomous Origin Protocol. If a session creator (the Origin Node) disconnects, the network intelligently "promotes" the next most stable node to administrative status. This ensures that the frequency remains managed and secure without ever needing a central server to oversee the transition. Its "Gossip" mechanism ensures that even if packet loss occurs, the network heals itself by re-broadcasting missing data through alternative peer paths.
Why Developers and Power Users Love It 1. Instant Secure Tunnels: Bypass complex VPN setups or firewall port-forwarding. Ghost-Link’s hole-punching capability allows for instant connectivity between nodes in different geographic regions or restricted office networks.
2. Zero-Footprint Auditing: Ideal for red-teamers and security researchers who need to share payloads or logs during an engagement without leaving a trace on the client's internal communication tools.
3. DevOps "War Rooms": Spin up a high-encryption frequency in seconds for emergency server troubleshooting. Share .env files or SSH keys directly from RAM to RAM, ensuring they never touch a hard drive or a third-party server.
4. Hardware Minimalism: Despite its power, the package is a lightweight, single-file script. It runs as easily on a $5 Raspberry Pi as it does on a high-end workstation.
The Future of "Ghost" Connectivity Ghost-Link is more than a utility; it is a proof-of-concept for the Decentralized Web (dWeb). By leveraging Distributed Hash Tables (DHT) and military-grade authenticated encryption (AES-GCM), it provides a level of privacy that was previously only accessible to those with deep technical knowledge of network tunneling.
Historically, true digital sovereignty was a privilege reserved for the elite few with the technical depth to tunnel through the noise; with Ghost-Link, absolute privacy is no longer a complex pursuit—it is a single command away.
