What This Is

A parallel internet with its own addressing, routing, DNS infrastructure, and TLD. Tunnels that break through firewalls. Location spoofing that works. Visual network topology you build by dragging nodes. Mesh networking with right-click.

Built from scratch because the regular internet has problems.


Stack

Tunnels:

  • WireGuard (fast, standard)
  • Experimental tunnels:
    • CDN tunnels are proxied through Cloudflare, nearly unblockable
    • HTTPS tunnels are proxied through Cloudflare, nearly unblockable
    • TCP-encrypted tunnels are pure encrypted stream

Location Spoofing:

  • Transparent proxy, no browser config
  • Unlimited cities, any browser/OS fingerprint
  • Automatic timezone/language/header matching
  • Removes VPN detection
  • Certificate install once, works forever

DNS:

  • Recursive resolver, 130k+ blocked domains
  • StevenBlack + URLhaus + community feeds
  • Per-tunnel toggle
  • Only logs blocks (for your dashboard)

Visual Topology:

  • Interactive real-time network map
  • Drag-and-drop to link tunnels
  • Live bandwidth, security events
  • WebSocket updates (no refresh)

Mesh:

  • Right-click tunnel → link to another tunnel
  • Or toggle “Link All” for full mesh
  • Encrypted private network between your devices

.doxx TLD:

  • Internal-only domains
  • Immune to seizures
  • Full DNS control

API:


Quick Start

Portal (easiest):

  1. Go to a0x13.doxx.net
  2. Click “Create Account” → save your token
  3. Click doxx.net cloud → pick location → tunnel created
  4. Scan QR code with WireGuard app
  5. Connected

API (for automation):

# Create account
curl -X POST https://setup.doxx.net -d "create_account=1"

# Create tunnel
curl -X POST https://setup.doxx.net \
  -d "create_tunnel=1" \
  -d "token=YOUR_TOKEN" \
  -d "type=wireguard" \
  -d "server=newyork-us"

Full API docs →


The Portal

a0x13.doxx.net - Interactive topology view

What you see:

  • Animated network graph
  • Your tunnels as glowing circles
  • Bandwidth flowing as particles (blue = down, orange = up)
  • Security events as red particles

What you do:

  • Click cloud → create tunnel
  • Right-click tunnel → link to another
  • Drag nodes to organize
  • Watch bandwidth update every second
  • See threats get blocked in real-time

Mobile:

  • Long-press for menus
  • Drag with touch
  • QR codes for setup

Services

VPN

  • Static IPs (10.x.x.x + IPv6)
  • Choose exit location
  • Multiple protocols
  • Works through firewalls

Location Spoofing

  • Pick city → appear there
  • Browser fingerprinting
  • Transparent (no config)
  • Certificate-based MITM

DNS Blocking

  • 130k+ malicious domains
  • Real-time blocklists
  • Per-tunnel control
  • Privacy-preserving

Mesh Networking

  • Link tunnels together
  • Full mesh or custom topology
  • Visual drag-and-drop
  • Encrypted connections

Domains

  • Register .doxx domains
  • Internal-only
  • Full DNS control
  • SSL certificates

Reality Check

What this is:

  • A parallel internet
  • Protocol research project
  • Freedom of expression platform
  • Built by one person
  • Free during beta

Limitations:

  • Beta software, bugs exist
  • Single developer
  • No SLA, no guarantees

Why This Exists

“Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.”
— Article 19, UDHR

Built to prove that privacy, security, and freedom of expression are technically achievable. Not by asking permission, but by building around the problems.

Thirty years of thinking about how packets should move. This is the result.


Technical Details

Network:

  • Private 10.0.0.0/8 space (users get random /31 pairs)
  • Dual-stack IPv6 with /127 allocations
  • Meshed backbone between PoPs
  • Internal recursive DNS
  • .doxx authoritative zone

Security:

  • Token-based auth (no passwords)
  • Zero logs (connection, traffic, DNS)
  • No email collection
  • No personal data

Architecture:

  • All services written in Go
  • WireGuard + custom protocols
  • Real-time WebSocket updates
  • HMAC-signed inter-service communication
  • ChaCha20-Poly1305 encryption

Documentation


Community


The Name

“doxx” was my handle in the ’90s. Name predates “doxxing” by decades. The irony isn’t lost on me—building privacy infrastructure with a name that now means the opposite. Tools are neutral. Intent matters.


Digital alchemy. Packets moving through adversarial networks. Freedom of communication.


Updated: October 23, 2025

Last updated on 1 Jan 2024
Published on 1 Jan 2024