# Privacy & Security

* End-to-end encryption with QUIC/TLS and optional overlay AEAD.
* Metadata minimization: only session hashes stored on-chain.
* Censorship resistance with multi-hop routing and distributed egress.
* Flexible provider deployments across desktop, mobile, and embedded devices.
