Documentation
Documentation
Everything you need to know about Shurli, from getting started to deep architecture details.
Deploy your own relay (recommended first step)
Initialize and connect your devices
Ping, traceroute, and resolve
Threat model, vuln reporting, audit history
Security, comparisons, troubleshooting
Run as a system service on Linux or macOS
Vault, 2FA, remote unseal
Pairing codes and async invites
Roles, permissions, peer ops
Zero-knowledge keys and Merkle tree
Send files between peers with integrity verification
Build on Shurli’s P2P network in Go
Prove membership without revealing identity
How plugins work, lifecycle, CLI, config
How Shurli works under the hood
Why every decision was made
Prometheus, Grafana, and audit logging
REST API reference for the daemon
Multi-phase implementation plan
Principles, inspirations, and how we build
Test strategy and coverage