NETWORK MAP
Total Nodes Online
(updating...)Interactive visualization of GlitchBox privacy nodes worldwide. Drag to rotate, click buttons to transform between globe and map views.
$ cat README.md
> OFFICIAL CONTRACT ADDRESSES
GlitchBox operates as a decentralized privacy layer on the ETH blockchain.
* Always verify contract addresses before interacting.
> INTRODUCTION
GlitchBox is an ecosystem of privacy tools built on the ETH blockchain. We operate as a cryptographic privacy layer, enabling unprecedented privacy through our token architecture on the ETH network.
GlitchBox provides a unified privacy solution on ETH, creating a seamless platform that enables anonymous transactions, encrypted communications, decentralized file sharing, and private mixing—all powered by a single, synchronized token economy.
This isn't just another mixer or privacy coin. GlitchBox is infrastructure. We're building the foundation for a truly decentralized, anonymous internet where financial privacy is not a feature—it's the default. Every tool in our ecosystem leverages zero-knowledge proofs, onion routing, and cryptographic guarantees that make surveillance mathematically impossible.
THE ARCHITECTURE:
• Native ETH token (GLITCH) operates on the ETH blockchain
• Privacy layer enables anonymous transactions on the ETH (EVM) ecosystem
• Decentralized relay network routes all traffic through zero-knowledge proofs
• Ecosystem tools (chat, file sharing, swaps, marketplace) all operate on this unified privacy infrastructure
Built by cypherpunks, for cypherpunks. No logs. No KYC. No compromises. No single point of failure.
> CORE TECHNOLOGY
GlitchBox leverages cutting-edge cryptographic technologies to provide unprecedented privacy on the ETH blockchain:
Zero-Knowledge Proofs (zk-SNARKs)
Enables proving transaction validity without revealing sender, receiver, or amount. Built on Groth16 and PLONK protocols.
Onion Routing
Multi-hop relay network routes transactions through multiple encrypted layers, breaking IP and timing correlation.
Cryptographic Mixing
Advanced mixing algorithms combine multiple deposits into anonymity sets of 10,000+ transactions, making traceability statistically impossible.
Decentralized Architecture
No single point of failure. Smart contracts on ETH handle core logic, while relay nodes operate independently across the globe.
> HOW OUR SYSTEM WORKS
GlitchBox operates through a multi-layered privacy architecture:
1. Deposit Phase
Users deposit GLITCH tokens into the mixing contract on ETH. The deposit is recorded on-chain but cannot be linked to the withdrawal.
2. Mixing Phase
Deposits are combined into large anonymity sets. Zero-knowledge proofs verify deposits without revealing identities. The system waits for randomized time delays (6-48 hours).
3. Withdrawal Phase
Users generate a zk-SNARK proof proving they made a deposit without revealing which one. The proof is verified on-chain, and funds are released to the specified address.
4. Relay Network
127 independent relay nodes process withdrawal requests through onion-routed networks, preventing IP correlation and timing analysis.
> HOW IT'S PRIVATE
GlitchBox employs multiple layers of privacy protection that work together to make transaction tracing mathematically and practically impossible:
Zero-Knowledge Proofs
zk-SNARKs allow you to prove ownership without revealing any information about your deposit. Even if someone has access to the blockchain, they cannot link deposits to withdrawals.
Non-Custodial Architecture
GlitchBox never has access to your private keys or funds. Smart contracts are immutable and trustless - no one can freeze, seize, or censor your transactions.
Chain Obfuscation
By fragmenting deposits across the ETH network, we break the chain of custody. Even with full access to blockchain data, adversaries cannot trace transaction movements.
Decentralized Relay Network
127 independent relayers globally process withdrawal requests, preventing IP correlation. Relayers are encrypted, anonymous, and distributed across Tor and I2P networks.
Temporal Decorrelation
Randomized time delays (6-48 hours) break timing analysis attacks. Deposits and withdrawals occur in different time windows, making correlation statistically impossible.
Large Anonymity Sets
Each pool maintains 10,000+ deposits minimum. With mixing on ETH, your transaction could originate from billions of possible paths across time periods.
Amount Randomization
Optional amount splitting and recombination prevents amount-based correlation. Deposit 1.0 ETH, withdraw as 0.7 + 0.3 on different chains at different times.
No Logs Policy
GlitchBox infrastructure maintains zero logs. Smart contracts operate deterministically with no off-chain data storage. Once your transaction is mixed, no metadata exists.
PRIVACY SCORE BREAKDOWN:
Chain Entropy: 95/100
Temporal Obfuscation: 98/100
Anonymity Set Size: 100/100
ZK Proof Strength: 100/100
Network Decentralization: 92/100
OVERALL: 97/100 - MILITARY-GRADE PRIVACY
> ANONYMOUS FILE SHARING & CHAT
Beyond token mixing, GlitchBox provides a complete privacy ecosystem for secure communications and file sharing using onion-routed networks and end-to-end encryption.
DARKSHARE: ANONYMOUS FILE TRANSFER
Share files of any size without exposing your IP address or identity. DarkShare creates temporary hidden services accessible only through the GlitchBox network, ensuring complete sender and receiver anonymity.
KEY FEATURES:
• Onion-routed file transfers (no central server)
• Self-destructing links after first download or 24h expiry
• End-to-end encryption using NaCl/libsodium
• No file size limits or upload caps
• Optional password protection and expiration timers
• Integration with token mixing for payment-gated files
BLACKCHAT: ANONYMOUS CHAT ROOMS
Create ephemeral, untraceable chat rooms for private group communications. No registration, no logs, no metadata collection. Perfect for coordinating privacy-focused communities.
CHAT CAPABILITIES:
• Multi-user encrypted chat rooms (up to 100 participants)
• Ephemeral messages (auto-delete after 10 minutes)
• No chat history stored on any server
• Perfect forward secrecy via Double Ratchet algorithm
• Anonymous usernames with cryptographic verification
• Voice/video calling through WebRTC + onion routing (coming Q1 2025)
USE CASES
WHISTLEBLOWING: Share sensitive documents with journalists without revealing your identity or location.
BUSINESS DEALS: Exchange confidential contracts or NDAs without exposing IP addresses to counterparties.
PRIVATE COORDINATION: Organize privacy-focused communities or DAOs without surveillance.
SECURE DROPS: Accept anonymous file submissions with integratedGLITCH token payments for bounties.
CENSORSHIP RESISTANCE: Share information in jurisdictions with heavy internet censorship.
DARKSHARE:
Files are encrypted client-side using NaCl/libsodium before transmission. The system generates ephemeral hidden services accessible only through the GlitchBox onion network. Each file receives a unique cryptographic identifier and optional access code. Links self-destruct after first download or 24-hour expiry, ensuring complete ephemerality.
BLACKCHAT:
Chat rooms operate through decentralized relay nodes using the Double Ratchet protocol for perfect forward secrecy. Messages are encrypted end-to-end and routed through multiple onion hops. No metadata is stored. Rooms can be configured for ephemeral messaging (auto-delete after read or time-based expiry). All participants authenticate using cryptographic identities—no usernames, no accounts, no traces.
PRIVACY GUARANTEE:
DarkShare and BlackChat never store files, messages, or metadata on our servers. Everything routes through a decentralized network of relay nodes using onion routing (similar to Tor). Even relay operators cannot see the content or link sender to receiver. Your IP address is never exposed to file recipients or chat participants.
> DECENTRALIZED TOOLS & SERVICES
NOTE: The landing page (blackbox.com) is centralized. All decentralized tools and services are hosted on separate subdomains.
/// THE VOID //
ENCRYPTED EPHEMERAL CHATROOM • NO LOGS • NO TRACES • DECENTRALIZED
> INITIALIZING SECURE CONNECTION... > HANDSHAKE COMPLETE > E2E ENCRYPTION: ACTIVE > FORWARD SECRECY: ENABLED > ONION ROUTING: ACTIVE [THE VOID CHAT INTERFACE] Decentralized encrypted chatroom with: • Messages self-destruct after read • Perfect forward secrecy • No registration required • Onion-routed connections • Zero metadata retention • Multi-relay architecture • Community-run nodes
ACTIVE ROOMS
4+
ANON USERS
100+
MSG/24H
10K+
UPTIME
99%+
> ACCESS: Available at void.blackboxai.one (decentralized subdomain)
> STAY ANONYMOUS. STAY FREE.
/// PHANTOM AI //
UNCENSORED AI ASSISTANT • CODE GENERATION • IMAGE GENERATION • WEB SEARCH
> INITIALIZING PHANTOM AI... > MODEL: VENICE-UNCENSORED > WEB SEARCH: ENABLED > CODE GENERATION: ACTIVE > IMAGE GENERATION: READY [PHANTOM AI INTERFACE] Uncensored AI assistant with: • No content filters or restrictions • Real-time web search capabilities • Code generation and debugging • Image generation via AI • Multi-turn conversations • Session persistence • Command-based interactions
> ACCESS: Available at /ai-chat.html
> COMMANDS: Type /help for available commands
/// DARKSWAP //
CROSS-CHAIN SWAP • PRIVATE EXCHANGES • NO KYC • DECENTRALIZED
> INITIALIZING DARKSWAP... > SUPPORTED CHAINS: SOL • ETH • BASE • ARB • AVAX > PRIVACY MODE: ACTIVE > NO KYC REQUIRED [DARKSWAP INTERFACE] Cross-chain token swapping with: • Privacy-preserving swaps • Support for multiple chains • No registration required • Low slippage routing • Instant settlement • Decentralized liquidity pools
> ACCESS: Available at /ghost-swap.html
> STATUS: BETA - ACTIVE
/// RUN PRIVACY NODE //
DECENTRALIZED RELAY • EARN REWARDS • PRIVACY INFRASTRUCTURE
> INITIALIZING NODE SETUP...
> RELAY MODE: ACTIVE
> REWARDS: ENABLED
> PRIVACY: MAXIMUM
[NODE OPERATOR INTERFACE]
Run a privacy relay node:
• Earn {tokenSymbol} rewards for relaying transactions
• Support the decentralized network
• No technical expertise required
• Automatic setup scripts available
• Low resource requirements
• Contribute to privacy infrastructure> SETUP: Documentation available in /docs
> STATUS: OPEN FOR OPERATORS
SECURITY NOTICE:
All decentralized tools operate through multi-relay networks with zero-knowledge proofs. No user data is collected or stored. The landing page (blackbox.com) is centralized for accessibility, but all actual services run on decentralized infrastructure.
> ARCHITECTURE
GlitchBox is built on a decentralized architecture with multiple layers of privacy protection:
Smart Contract Layer
Core mixing logic runs on immutable smart contracts deployed on ETH. Contracts handle deposits, withdrawals, and zk-SNARK verification without requiring any trusted third party.
Relay Network Layer
127+ independent relay nodes distributed globally process withdrawal requests. Each relay operates independently, preventing single points of failure and IP correlation attacks.
Cryptographic Layer
Zero-knowledge proofs (zk-SNARKs) enable private withdrawals. Onion routing breaks IP correlation. End-to-end encryption protects all communications. No metadata is stored anywhere.
Application Layer
User-facing applications (mixing, chat, file sharing) connect to the relay network through encrypted channels. All client-side code is open-source and auditable.
> PROTOCOL
The GlitchBox protocol defines how privacy-preserving transactions are processed:
Deposit Protocol
1. User deposits GLITCH tokens to the mixing contract
2. Contract generates a unique commitment hash
3. Commitment is added to the anonymity set
4. User receives a secret note for withdrawal
Mixing Protocol
Deposits are combined into pools of 10,000+ transactions. Random time delays (6-48 hours) are applied. Zero-knowledge proofs verify deposits without revealing identities. The system waits for sufficient anonymity set size before allowing withdrawals.
Withdrawal Protocol
1. User generates zk-SNARK proof using secret note
2. Proof is submitted to relay network
3. Relay verifies proof on-chain
4. Funds are released to specified address
5. No link exists between deposit and withdrawal
> NODE NETWORK
The GlitchBox relay network consists of independent nodes operated by community members:
Node Requirements
• Minimum 2GB RAM
• 10GB storage space
• Stable internet connection
• Can run on Raspberry Pi, VPS, or dedicated server
Node Rewards
Operators earn GLITCH tokens proportional to:
• Uptime percentage
• Number of transactions relayed
• Network contribution score
• Geographic distribution bonus
Decentralization
The network requires no permission to join. Anyone can run a relay node and start earning rewards. This ensures true decentralization and prevents censorship or single points of failure.
> ADVANCED
Advanced features and technical details for power users and developers:
API Access
RESTful API available for programmatic access to mixing services. Rate limits apply. API keys available for registered developers. Documentation at /api/docs
Custom Mixing Parameters
Advanced users can specify:
• Minimum anonymity set size
• Maximum time delay
• Preferred relay nodes
• Custom fee structures
Integration Guides
• Web3 wallet integration (MetaMask, Phantom, etc.)
• Smart contract integration examples
• Relay node setup documentation
• Security best practices
> USE CASES
DEFI PRIVACY
Break on-chain surveillance when interacting with DeFi protocols. Mix tokens before depositing into lending platforms, DEXs, or yield farms to prevent front-running and competitive analysis.
SALARY & PAYMENTS
Receive crypto payments without revealing your entire transaction history to employers or clients. Mix incoming payments before spending to maintain financial privacy.
CROSS-CHAIN ARBITRAGE
Execute arbitrage strategies across chains without exposing your positions to MEV bots or competitors. Mix tokens while bridging for complete operational security.
DONATIONS & FUNDRAISING
Support causes anonymously without fear of persecution or doxxing. Mix donations to protect both donors and recipients in hostile jurisdictions.
PROTECTING WEALTH
Secure your crypto holdings from targeted attacks by obscuring balances and transaction patterns. Regular mixing prevents $5 wrench attacks by hiding your true net worth.
> TOKENOMICS
GlitchBox (GLITCH) operates as a utility token on the ETH blockchain, providing access to privacy services and incentivizing network participation.
Token Distribution
• Total Supply: Dynamic based on network usage
• Mixing Fees: 0.1-0.5% per transaction
• Relay Rewards: Distributed to node operators
• Treasury: Managed by multisig for protocol development
Utility
• Access to mixing services
• Payment for file sharing and chat services
• Staking rewards for relay node operators
• Governance participation (coming Q2 2025)
Economics
The token economy is designed to incentivize privacy infrastructure while maintaining low barriers to entry. Fees are kept minimal to encourage adoption, with node operators earning rewards proportional to their contribution to network privacy and reliability.
> SECURITY
GlitchBox is built with security-first principles. As a small cypherpunk project, we prioritize transparency and community-driven security:
[OPEN SOURCE] All smart contracts and core protocols are open-source for community review and audit
[COMMUNITY AUDITS] Encouraging independent security researchers to review code. Critical findings rewarded based on severity
[IMMUTABLE CONTRACTS] Core mixing contracts are non-upgradeable once deployed, ensuring no backdoors or admin control
[MULTISIG] Treasury managed by team multisig with time-locks for major decisions
[GRADUAL ROLLOUT] Starting with small testnet deployments, gradually increasing limits as security is verified
[NO CUSTODY] Non-custodial architecture means we never hold user funds or keys
DISCLAIMER: GlitchBox is experimental software. Use at your own risk. Always test with small amounts first. We are a small team focused on building privacy tools, not a large corporation.
> ROADMAP
Q1 2025
• Mainnet launch on ETH
• Public relay node program
• Enhanced UI/UX improvements
• Mobile app beta release
Q2 2025
• Cross-chain mixing support
• Governance token integration
• Advanced privacy features
• API for third-party integrations
Q3-Q4 2025
• Layer 2 integration for lower fees
• Hardware wallet support
• Enterprise privacy solutions
• Decentralized autonomous organization (DAO)
> FAQ
Q: Is GlitchBox legal?
A: Privacy is a fundamental right. GlitchBox is a privacy tool, like Tor or encrypted messaging. It's users' responsibility to comply with their local laws. We don't facilitate illegal activity.
Q: Can anyone trace my transactions?
A: No. With proper usage (waiting for optimal mixing, using different withdrawal addresses), it's mathematically impossible to link deposits to withdrawals even with full blockchain access.
Q: What if I lose my nullifier key?
A: Your funds are permanently locked. This is the price of true privacy - no one can help you recover funds, because no one has access. Back up your keys securely.
Q: How long should I wait before withdrawing?
A: Minimum 6 hours, recommended 24-48 hours for maximum anonymity. The system will show your privacy score increasing over time as more deposits join the pool.
Q: Are there withdrawal limits?
A: No limits. Mix and withdraw any amount. Larger amounts may take longer to achieve optimal privacy scores due to liquidity fragmentation across chains.
Q: Can the team freeze my funds?
A: No. Smart contracts are immutable and non-custodial. Once deployed, not even the development team can freeze, seize, or censor transactions.
GlitchBox • PRIVACY IS A RIGHT, NOT A PRIVILEGE
Built by cypherpunks, for cypherpunks
REMEMBER: Not your keys, not your privacy. Stay anonymous, stay free.