Early-stage software. Shurli is experimental and built with AI assistance. It will have bugs. Not recommended for production or safety-critical use. Read the disclaimer.

Blog

Rebuilding the Engine While It Runs

Rebuilding the Engine While It Runs

How Shurli went from a single binary to an extensible platform with crash-recovering plugins, transport policies, and a three-layer roadmap toward AI-generated extensions.

We Broke Shurli's Network 16 Times. It Kept Running.

We Broke Shurli's Network 16 Times. It Kept Running.

We switched WiFi, tethered phones, plugged in cables, and connected VPNs. 16 physical network transitions across 5 network types. Shurli survived all of them without a single restart.

Who Gets In: Building Per-Peer Access Control with Macaroon Tokens

Who Gets In: Building Per-Peer Access Control with Macaroon Tokens

How Shurli controls exactly who can access what, for how long, with cryptographic capability tokens that can be delegated but never widened.

Building File Transfer That Doesn't Trust Anyone

Building File Transfer That Doesn't Trust Anyone

How Shurli's file transfer handles integrity, privacy, DDoS defense, and resume - and what we learned from the gaps in existing tools.

First External Connection: NZ to AU Over Relay

First External Connection: NZ to AU Over Relay

Shurli's first external user connected from Australia to New Zealand through a relay circuit. Here's what worked, what broke, and what we fixed.

From Broken to Bulletproof: How Chaos Testing Transformed Shurli's Network Layer

From Broken to Bulletproof: How Chaos Testing Transformed Shurli's Network Layer

4 days of physical chaos testing across 5 ISPs and 3 VPNs. 11 root causes found and fixed. The daemon now handles every network transition automatically.

Post-Phase 8: Public Seeds, Better Onboarding, Hardened Internals

Post-Phase 8: Public Seeds, Better Onboarding, Hardened Internals

Public seed relays live, async invite flow, relay naming, vault auto-init, 14 security fixes, remote unseal protocol, and DNSSEC. 38 commits, 122 files.

Phase 8: One Seed to Rule Them All

Phase 8: One Seed to Rule Them All

Unified BIP39 seed, encrypted identity, full remote relay admin over P2P, signed operator announcements, session tokens. 24 new files, 56 tests. One backup covers everything.

Phase 7: Prove You Belong Without Saying Who You Are

Phase 7: Prove You Belong Without Saying Who You Are

Zero-knowledge membership proofs, private reputation scores, BIP39 key management. 27 new files, 91 tests, 14 Prometheus metrics. L2 blockchain cryptography applied to P2P networking.

Phase 6: Your Relay Is Now a Fortress

Phase 6: Your Relay Is Now a Fortress

Role-based access, HMAC-chain macaroon tokens, async invite deposits, passphrase-sealed vault, remote unseal over P2P, and two-factor auth. 19 new files, 3,655 lines, zero new dependencies.