Now with Kyber-1024 Post-Quantum Encryption

Trust No One.
Verify Everything.

Trinity is a sovereign PKI designed for teams that demand absolute control over their Root of Trust. Air-gapped signing, quantum-safe encryption, zero dependencies on public CAs.

Why Trinity

Security Without Compromise

Built for developers and security teams who refuse to trust the black-box CAs of the internet.

๐Ÿ›ก

Air-Gap Ready

Root keys never touch the internet. The Authority CLI runs entirely offline โ€” sign certificates from an air-gapped machine, a USB stick, or a Raspberry Pi in a vault.

๐Ÿ”ฎ

Post-Quantum Encryption

The "Blind Drop" protocol uses Kyber-1024 (ML-KEM) for key exchange, ensuring your certificate requests survive the quantum computing era.

๐Ÿ–ฅ

Desktop Identity Vault

Trinity Passport is a native desktop app (Windows, macOS, Linux) that manages your private keys locally. Keys never leave your device.

โšก

Edge-Native Gateway

Trinity Spirit is a Cloudflare Worker that relays encrypted requests at the edge. Zero-trust by design โ€” the gateway cannot read your data.

๐Ÿ”‘

Modern Cryptography

Ed25519 for signing, XChaCha20-Poly1305 for vault encryption, AES-256-GCM for transport, Blake2b for key derivation. No legacy baggage.

๐Ÿข

Open Core Model

Free for individual developers and small teams. Enterprise tier available for organizations needing audit logs, SSO integration, and SLA support.

Architecture

The Four Pillars

Each component is independently deployable, with clear separation of concerns.

๐Ÿ›

Authority

Go CLI

The offline Root CA. Generates keys, signs certificates, manages CRLs. Designed for air-gapped environments.

๐Ÿชช

Passport

Go + Wails

Desktop identity vault. Manages private keys, generates CSRs, and handles the certificate lifecycle.

๐Ÿ‘ป

Spirit

TypeScript ยท Workers

Edge gateway on Cloudflare. Relays encrypted CSRs and certificates via D1 database.

๐ŸŒ

Connect

Go ยท Self-Hosted

Universal server for on-premise deployments. SQLite + Litestream. Runs anywhere Linux runs.

The Trinity Protocol

Paranoid by Design

Our security model assumes the transport layer is compromised. Every phase adds a layer of protection.

1

The "Blind Drop" โ€” Bootstrap

Client encrypts a CSR with the Authority's Kyber-1024 public key and drops it into the server's mailbox. The server acts as a blind courier โ€” it cannot read the payload.

2

Tunnel-in-Tunnel โ€” Steady State

Once the client has a signed certificate, it opens a private mTLS tunnel inside the standard HTTPS connection. The connection trusts only the Trinity Root CA โ€” not public CAs.

3

Air-Gap Signing โ€” Root Protection

The Authority manually pulls encrypted drops, decrypts and signs them offline, and pushes the sealed response back. Root keys never touch the internet.

Quick Start

Up and Running in Minutes

Initialize your Root CA and sign your first certificate with three commands.

terminal
# Build the Authority CLI
$ make build

# Initialize Root CA (passphrase-protected Ed25519 + Kyber-1024)
$ ./trinity init --name "My Root CA" --org "My Org"

# Sign a CSR interactively
$ ./trinity sign

# Or sign an encrypted Blind Drop
$ cat drop.enc | ./trinity sign --transport-key safe/transport.key
Read the Full Guide โ†’

Own Your Root of Trust

Trinity is open source. Start building your sovereign PKI today.