About the challenge
Access to information and secure communication remain crucial issues, particularly in environments where Internet connectivity is limited or compromised. This hackathon aims to stimulate innovation in networking and cryptography by asking students to design and prototype a resilient and sovereign communication and file transfer solution.
The challenge is to create a next-generation protocol that does not depend on any centralized infrastructure or connection to the public Internet, while ensuring data confidentiality and integrity.
Get started
Requirements
What to Build
The Archipel protocol will be based on the peer-to-peer (P2P) architecture used by BitTorrent, but will apply it to both file transfer and messaging:
Total decentralization: No data will pass through a centralized server (tracker, messaging server, or storage server).
Data Segmentation: Files and messages must be fragmented into small chunks to enable simultaneous, fault-tolerant transfer.
Distribution by Nodes: Each machine (node) participating in the network is both a client and a server. Nodes are responsible for distributing and sharing data chunks.
AI Assistance (via Gemini API): Integration of the Gemini API into the encrypted messaging feature. Gemini's AI will need to be able to intervene in the discussion (for example, following a tag) to provide contextual assistance, similar to Meta AI's intervention in WhatsApp discussions.
Prizes
Google Cloud and MLH Swag
Prizes will be awarded to the top three groups following the hackathon.
Google Cloud and MLH Swag
Prizes will be awarded to the top three groups following the hackathon.
Google Cloud and MLH Swag
Prizes will be awarded to the top three groups following the hackathon.
Devpost Achievements
Submitting to this hackathon could earn you:
Judges
Kokou Adjétey Eric-Gratien BOKORVI
José Quam TOFFA
Fulgence AMANI
Judging Criteria
-
Security and Cryptography
Robustness and efficiency of the end-to-end encryption mechanism. Relevance and innovation of the solutions proposed for peer authentication. -
Functionality
Does the protocol correctly implement file transfer and messaging? Does the system operate stably without an Internet connection? -
Architecture and Design
Code quality (readability, modularity), clarity and completeness of protocol documentation, compliance with the decentralized BitTorrent model.
Questions? Email the hackathon manager
Tell your friends
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
