The Marmot Protocol has published its full specification as six Marmot Implementation Proposals covering everything from identity and group construction to encrypted media and privacy-preserving push notifications.
This post walks through each MIP to explain what the protocol does at every layer and how the cryptographic guarantees work in practice for users who care about private communication. The specs are open and the implementations are already shipping.
This post walks through each MIP to explain what the protocol does at every layer and how the cryptographic guarantees work in practice for users who care about private communication. The specs are open and the implementations are already shipping.












