Independent Research Collective

Privacy is a fundamental right

We research, develop, and advocate for open-source tools that protect digital communication and personal data in an increasingly surveilled world.

🛡️

Building the future of
secure communication

Our interdisciplinary team combines cryptography, network engineering, and policy research to create practical privacy solutions.

🔐

End-to-End Encryption

Researching next-generation encryption protocols resistant to quantum computing threats and side-channel attacks.

🌐

Network Privacy

Developing traffic analysis countermeasures and metadata-resistant communication channels for high-risk environments.

📡

Protocol Design

Creating open, auditable protocols that balance security, performance, and usability for real-world deployment.

🛡️

Threat Modeling

Comprehensive adversary analysis frameworks for journalists, activists, and organizations in hostile digital environments.

📊

Censorship Analysis

Continuous monitoring and documentation of internet censorship techniques across 40+ countries and regions.

🔓

Open Source Tools

All our research outputs and tools are released under permissive licenses, ensuring transparency and community trust.

24

Published Papers

12

Open Source Tools

47

Countries Analyzed

89

Contributors

Research & Papers

Peer-reviewed publications and technical reports from our research programs.

Obfuscation-Resistant Protocol Fingerprinting: A Comprehensive Survey
Analysis of modern DPI evasion techniques and their effectiveness against state-level adversaries across different network conditions.
2026 Q1
Post-Quantum Key Exchange in Resource-Constrained Environments
Practical implementation of lattice-based key exchange protocols for IoT devices with limited computational resources.
2025 Q4
Metadata Leakage in Encrypted Messaging: A Longitudinal Study
Three-year study of metadata exposure patterns in popular end-to-end encrypted messaging platforms.
2025 Q3
Censorship Circumvention Benchmarks: Methodology & Results 2025
Standardized testing framework for evaluating anti-censorship tools under realistic adversarial conditions.
2025 Q2
Traffic Shaping as a Covert Channel: Detection and Prevention
Novel approach to identifying covert communication channels embedded within legitimate network traffic patterns.
2025 Q1
// Example: Noise padding for protocol obfuscation
func PadFrame(payload []byte, maxSize int) []byte {
  noise := make([]byte, maxSize-len(payload))
  rand.Read(noise)
  return append(payload, noise...)
}

Research Team

A distributed collective of researchers, engineers, and advocates working across multiple time zones.

A.K.

Dr. A. Korhonen

Cryptography Lead

M.V.

M. Virtanen

Network Security

J.L.

J. Lehtonen

Protocol Design

S.N.

S. Niemi

Policy & Advocacy

Contact Us

Interested in collaboration, have questions about our research, or want to contribute to our open-source projects? We'd love to hear from you.

research@safty.link
Helsinki, Finland
github.com/safty-research