Open Source Advanced Data Protection for Everyone

We built an open source version of Advanced Data Protection that no single country can backdoor. Distributed cryptography that eliminates single points of failure while maintaining the simplicity of password-based encryption.

Protecting privacy at the user level

๐ŸšจThe Motivation Behind OpenADP

Apple was forced to remove end-to-end iCloud encryption ("Advanced Data Protection") from the UK after government orders demanded backdoors for access to every user's data globally, not just users in the UK.

๐Ÿ›๏ธ

Government Backdoor Demands

Governments worldwide are forcing tech companies to remove encryption or build backdoors. When you control the company, you control everyone's data.

๐Ÿ‘๏ธ

Undisclosed widespread monitoring

Current systems are vulnerable to government orders for mass secret, bulk surveillance of user data. Single corporate entities become surveillance chokepoints.

OpenADP's Answer: Distributed Trust

Instead of one company that can be forced to comply, OpenADP distributes trust across multiple independent servers in different jurisdictions. Governments must work with operators in multiple countries to access any user's data - ending secret mass surveillance while still allowing legitimate law enforcement when operators in multiple jurisdictions agree.

How OpenADP Works

1

Secret Generation

A cryptographic secret is generated and split into multiple shares using threshold cryptography.

2

Distributed Storage

Each share is stored on a different independent server. No single server can reconstruct your key.

3

Threshold Recovery

To decrypt, you need responses from a threshold of servers. Even if some servers fail, your data remains accessible.

4

Key Reconstruction

The client automatically reconstructs the encryption key from the recovered shares - completely transparent to you.

Live Network Status

OpenADP is already running with live servers protecting user data. Monitor the network health and explore the server infrastructure in real-time.

๐Ÿ”

Health Monitoring Dashboard

Real-time monitoring of all OpenADP servers with response times, uptime tracking, and geographic distribution. Beautiful web interface with automatic 5-minute health checks.

โšก Real-time Metrics ๐ŸŒ Geographic View ๐Ÿ“Š Historical Data ๐Ÿ”” Alert System
View Live Dashboard
๐Ÿ–ฅ๏ธ

Server Network Directory

Complete list of all OpenADP servers in the network with their capabilities, locations, and connection information. Updated automatically as new servers join.

๐Ÿ“ Server Locations ๐Ÿ”ง Capabilities ๐Ÿ”— Connection Info โœ… Verification Status
Browse Server List
3+
Active Servers
2
Countries
5min
Health Check Interval
24/7
Monitoring

๐Ÿ” Complete Transparency

All network health data is public and automatically committed to GitHub. You can see exactly which servers are online, their response times, and historical performance. No hidden metrics, no secret monitoring - everything is open for community verification.

Building on Big Tech's Privacy Foundation

๐Ÿ›ก๏ธ

Nation-State Resistance

While current solutions protect against traditional threats, OpenADP adds resistance to emerging government pressures that no single company can withstand alone.

๐ŸŒ

Multi-Jurisdiction Protection

Extends existing privacy protections across multiple countries, creating natural checks and balances that single companies cannot provide.

๐Ÿšซ

Distributed Architecture

Complements existing corporate security with decentralized trust that makes system-wide compromises impossible.

๐Ÿ”„

High Availability

Server failures or even government seizures don't prevent data recovery. System remains functional with partial server outages.

๐Ÿ‘ค

User Friendly

Same simple password-based interface. All the complexity is hidden - users just enter their password.

๐Ÿ”“

Open Source Transparency

No secret backdoors possible. Every line of code is auditable. Run your own servers, contribute improvements, verify security.

"We need to take action now to protect users."
- From the original call to action that started OpenADP
๐Ÿš€ JOIN THE MOVEMENT

Help Us Build the Future of Privacy

OpenADP needs YOU to run nodes and make distributed privacy a reality. Together, we can create a world where no single government can compromise everyone's data.

0.01%
Maximum data that could be accessed annually
Multiple
Countries must cooperate for any access
โˆž
Mass surveillance becomes impossible

๐Ÿข Enterprise & Big Tech Welcome

Whether you're an individual developer, startup, or enterprise like IBM, Microsoft, AWS, or Google - we want you to participate! Run nodes, integrate our APIs, or help build the distributed privacy infrastructure of the future.

Individual Developers Startups Fortune 500 Cloud Providers Privacy Companies
๐Ÿ–ฅ๏ธ

Run an OpenADP Node

Be part of the distributed infrastructure that protects privacy worldwide. Whether you're an individual, startup, or enterprise like IBM - your participation strengthens the network.

โšก Automated setup in minutes
๐Ÿ›ก๏ธ Help protect millions of users
๐Ÿข Enterprise & individual operators welcome
Join Discord & Start Your Node ๐Ÿฅง Raspberry Pi QuickStart

Individuals, startups, enterprises all welcome โ€ข We curate trusted operators

โš ๏ธ Important: New servers must be registered on Discord to be discoverable by clients

๐Ÿ“ฑ

Build Applications

Integrate OpenADP into your applications! Perfect for message history backup apps, crypto wallets, secure file storage, and more. Authors of popular tools like VeraCrypt especially welcome.

๐Ÿ’ป

Contribute Code

Help improve OpenADP's core security, performance, and usability. Every contribution makes the system stronger for everyone.

๐Ÿ“ข

Spread the Word

Help others understand why distributed privacy matters. Share OpenADP with developers, privacy advocates, and tech communities.

๐Ÿ”

Security Audits

Help verify OpenADP's security through code reviews, penetration testing, and cryptographic analysis.

๐Ÿš€ Build the Future: Application Developer Ecosystem

OpenADP isn't just about nodes - we need application developers to integrate distributed privacy into the tools people use every day. This is the path to mainstream adoption and eventually big tech integration.

๐Ÿ’ฌ

Message History Backup

Secure messaging apps that need to backup conversation history across devices without central storage vulnerabilities.

๐Ÿช™

Crypto Wallets

Cryptocurrency wallets that need secure backup and recovery without relying on centralized services or single points of failure.

๐Ÿ“

File Storage Apps

Cloud storage applications that want to offer true end-to-end encryption without holding the keys themselves.

๐Ÿ”

Password Managers

Password management tools that need distributed backup for vault recovery without central authority risks.

๐Ÿ“ฑ

Device Backup Tools

Mobile and desktop backup applications that want to eliminate single points of failure in key management.

๐Ÿฅ

Healthcare Apps

Medical record systems that need HIPAA-compliant backup with distributed trust instead of central vulnerability.

๐ŸŽฏ Enterprise & Big Tech: Join the Network

Today, companies like Apple, Google, and Microsoft back up most of our sensitive data. We welcome big tech companies both as integrators AND as node operators. If IBM wants to run nodes, we want to support them!

๐Ÿ–ฅ๏ธ Run Enterprise Nodes

Companies like IBM, Microsoft, AWS, and others can operate OpenADP nodes, adding enterprise-grade reliability and geographic distribution to the network.

๐ŸŒ Global Presence ๐Ÿ”’ Enterprise Security โšก High Availability
๐Ÿ”— Integrate OpenADP

Integrate distributed privacy into your existing services. Reduce liability while providing better privacy guarantees to your users.

๐Ÿ“‰ Reduced Liability ๐Ÿ›ก๏ธ Enhanced Privacy ๐Ÿ† Competitive Edge
Why Enterprises Should Participate:
  • Strategic Positioning: Be early leaders in distributed privacy technology
  • Risk Mitigation: Reduce data liability and government pressure
  • Network Effects: Benefit from and contribute to a stronger ecosystem
  • User Trust: Demonstrate genuine commitment to privacy protection
  • Technical Innovation: Participate in cutting-edge cryptographic infrastructure

๐Ÿš€ Start Building Today

Join our developer community and help build the applications that will drive mainstream adoption of distributed privacy. Your work today shapes the future of data protection.

๐Ÿค Node Operator Verification Process

1๏ธโƒฃ

Join Our Discord Community

Connect with us on Discord first. We want to get to know our node operators and ensure they're committed to protecting user privacy.

2๏ธโƒฃ

Chat & Get Verified

We'll chat with you about your interest in OpenADP, your technical background, and your commitment to the network. This helps us build a trusted operator community.

3๏ธโƒฃ

Set Up Your Node

Once verified, we'll guide you through the automated setup process and add your node to our curated network of trusted operators.

Why we verify operators: OpenADP's security depends on having honest, committed node operators. By curating our network, we ensure users can trust that their data is protected by people who genuinely care about privacy.

โฐ Why Your Help Is Needed Now

๐Ÿ›๏ธ

Government Pressure Increasing

More countries are demanding backdoors in encryption. We need distributed infrastructure before these demands become universal.

๐Ÿ“ˆ

Network Effects Matter

The more nodes we have, the stronger the system becomes. Early operators help establish the foundation for global privacy protection.

๐Ÿ”—

Critical Mass Required

We need nodes in multiple jurisdictions to make the system work. Your location and participation could be the key to protecting users in your region.

๐ŸŒŸ Make History: Be Part of the Privacy Revolution

Every great technological shift needed early adopters who believed in a better future. OpenADP is that future - where privacy isn't controlled by any single entity, where mass surveillance becomes technically impossible, and where emergency access requires genuine international cooperation.

Your server. Your contribution. Our collective privacy.

Join the movement. Protect privacy. Change the world.

Get Started

๐Ÿš€ Run an OpenADP Node (After Discord Verification)

# 1. First, join our Discord and get verified!
# https://discord.gg/TaHNeGsE8j

# 2. Then clone and install OpenADP node
git clone https://github.com/waywardgeek/openadp.git
cd openadp
sudo ./scripts/update-openadp-node.sh

# 3. Let us know on Discord - we'll add you to the trusted network! ๐ŸŒ

โœจ Automated installer works on Ubuntu, Debian, Fedora, CentOS, Arch, and more!

๐Ÿค Important: Connect with us on Discord before setting up your node for verification and network inclusion.

Simple Encryption for Users

# Encrypt a file using OpenADP
python3 encrypt.py sensitive_document.txt

# Decrypt the file
python3 decrypt.py sensitive_document.txt.enc

Technical Foundation

  • Elliptic Curve Cryptography: Based on Curve25519 for security and performance
  • Threshold Cryptography: Shamir's Secret Sharing with cryptographic enhancements
  • JSON-RPC Protocol: Standardized communication with distributed servers
  • Automatic Failover: Client automatically handles server failures and recovery
  • Cryptographic Identity: Unique identifiers derived from user, device, and backup contexts
  • Automated Operations: One-command node setup with health monitoring and updates

System Architecture

Client Application

Handles secret sharing, server communication, and key reconstruction

Share 1
Share 2
Share N

Server 1

Independent database

Server 2

Independent database

Server N

Independent database

Finding a Balance in the Encryption Debate

OpenADP isn't about making data completely inaccessible to law enforcement. We want to end the encryption wars by providing a balanced solution that protects privacy while allowing for legitimate emergencies.

โŒ Current Binary Choice

Backdoors for All

Governments demand universal access, enabling mass surveillance and abuse

vs
No Access Ever

Complete encryption leaves no way to help in genuine emergencies like kidnapped children

โœ… OpenADP's Balanced Approach

๐Ÿšซ Prevents Mass Surveillance

No single government can access user data - requires cooperation across multiple jurisdictions

๐Ÿ†˜ Allows Emergency Access

When multiple server operators in different countries agree, urgent cases (missing children, elderly with dementia) can be addressed quickly

โš–๏ธ Natural Checks and Balances

Distributed decision-making prevents abuse while enabling legitimate law enforcement when lives are at stake

๐Ÿ”ฎ Long-Term Vision: Policy in Code

Future versions could enforce sane policies directly in the code - for example, allowing only 0.01% of user data to be released annually. This would force authorities to prioritize genuinely urgent cases while mathematically preventing mass surveillance.

Real-World Example

"A child is kidnapped and their phone's GPS could save their life. Instead of potentially being ordered to provide access to millions of users to do the right thing for one, OpenADP server operators in multiple countries can cooperate to release just that one user's encryption key."

This Is How We End the Encryption Wars

By providing a technical solution that protects privacy by default while still allowing for legitimate emergency access through distributed cooperation, we can finally move beyond the false binary choice that has polarized this debate for decades.

The Next Evolution: Why Big Tech Needs OpenADP

Current Big Tech privacy solutions work well today - major companies have been implementing hardware-based encryption for years, and advanced data protection features have been groundbreaking. But the world is changing, and new threats to privacy are emerging that require a different approach.

๐ŸŽฏ

Reduces Data Liability

The Problem: Tech companies must store sensitive user data for legitimate services (backups, sync, etc.) but then become targets for constant government data requests.

OpenADP Solution: Companies can provide the same user services without holding the sensitive encryption keys - users get seamless backups, companies avoid data liability.

๐Ÿ“ฐ

Protects Brand Reputation

The Problem: When companies comply with government data requests, it damages user trust and creates negative publicity.

OpenADP Solution: Companies can honestly say "we don't have access to your encrypted data" - removing them from controversial data request scenarios.

โš–๏ธ

Reduces Legal Complexity

The Problem: Managing data requests across different jurisdictions with conflicting laws is expensive and legally complex.

OpenADP Solution: Legal complexity shifts to distributed server operators - companies can focus on building great products instead of managing government relations.

๐Ÿ”’

Prevents Forced Backdoors

The Real Threat: Governments increasingly demand that companies insert secret surveillance capabilities into closed-source systems.

OpenADP Protection: Open source code makes secret backdoors impossible - protecting companies from being forced to betray their users in secret.

๐Ÿ“ฑ Real Example: Hardware-Based Encryption

Major tech companies have been implementing hardware-based encryption for user backups for years - most users don't even know about it. This wasn't primarily about user privacy (though that's important) - it was about getting companies out of the business of having access to sensitive user data.

Current Challenge

  • Companies need encrypted backups for user experience
  • But holding keys creates liability and government pressure
  • Closed-source solutions vulnerable to secret surveillance orders

With OpenADP

  • Same great user experience - seamless backups and restore
  • Companies no longer hold sensitive keys - reduced liability
  • Open source prevents secret backdoors being inserted

๐Ÿค Collaboration, Not Competition

OpenADP works alongside existing tech company infrastructure. Companies can integrate OpenADP for key management while still providing all the cloud services users love - backups, sync, device setup, etc. The only difference is that the sensitive encryption keys are managed by distributed servers instead of the company itself.

Result: Users get the same great experience, companies reduce their liability and legal complexity, and secret mass surveillance becomes technically impossible.