System Online

Stay Connected
When Networks Collapse.

Decentralized communication for civilians in war zones, disaster areas, and internet shutdowns.

Explore the Prototype

A Disconnected World.

During conflicts or massive natural disasters, centralized internet and cellular networks fail instantly.

This leaves civilians dangerously cut off from the rest of the world.

System Failure

Real-Life Impact

When conventional infrastructure fails, people build their own. Click a node to decrypt the full operational logs.

Decentralized Routing

A
B

Crisis Simulator

Select a disaster scenario to observe autonomous network self-healing and vector-rerouting in real time.

Offline
Offline
Offline
Vector Re-routing Sequence Active

Zero-Trust Encryption

The most hostile environments demand the highest grade of security. Privacy by design, end-to-end.

Click to Toggle X25519 Encryption Layer

Network Architecture

Relay Layer 0

Dynamic Handshake

When initializing, nodes send high-frequency broadcast chirps to negotiate keys without a centralized certificate authority.

Store & Forward

Packet Buffers

Orphaned target? Packets map to the closest geographic node buffer until the destination enters uplink range.

Bridge Protocol

Gateway Mode

Any node with an active WAN connection instantly elevates to a tier-1 Gateway, opening a pipeline for all local nodes.

Live Message Flow

Interactive Simulation Ready

Tactical Advantages

Stay Connected in Crises

No central towers? Direct device-to-device tunneling ensures communication never drops.

Decentralized Resilience

Auto-healing algorithms bypass offline nodes in milliseconds.

Military-Grade Encryption

X25519 elliptic curve keys lock payloads before packets leave your hardware.

Community Infrastructure

The software-defined grid gets faster and more redundant with every new user.

Infinite Scalability

WarComm is not limited by physical infrastructure. The network mathematically strengthens as more nodes join. Our vision is an inter-country mesh grid, completely decentralized, powering millions of discrete connections per second.

Hackathon Journey

48 Hours of Code

Friday 6 PM

Phase 1: Inception

Identified critical vulnerability in centralized comms during crises.

Saturday 2 AM

Phase 2: Protocol Design

Engineered Vector Routing algorithm to bypass failing nodes.

Saturday 3 PM

Phase 3: Prototype

First successful multi-hop message transmitted via BLE between 3 devices.

Sunday 4 AM

Phase 4: Optimization

Integrated X25519 Encryption and completed the interactive web dashboard.

Sunday 10 AM

Phase 5: Deployment

Final codebase merged. WarComm goes live.

Tech Deep Dive

Click to decrypt system protocols

How does peer-to-peer mesh work?

+

What is device discovery?

+

How do Gateways function?

+

The Hackers Behind WarComm

Decentralized Engineering Team

A

ARHAM KHAN

WEBSITE DESIGNER

P

PRANJAL KUMAR

P2P Systems Engineer

N

NIHAL KUMAR

Backend Architect

G

GAURAV BANSAL

Cryptography Lead

Bring Connectivity
Back.