About the challenge

Access to information and secure communication remain crucial issues, particularly in environments where Internet connectivity is limited or compromised. This hackathon aims to stimulate innovation in networking and cryptography by asking students to design and prototype a resilient and sovereign communication and file transfer solution.

 

The challenge is to create a next-generation protocol that does not depend on any centralized infrastructure or connection to the public Internet, while ensuring data confidentiality and integrity.

 

Get started

Requirements

What to Build

The Archipel protocol will be based on the peer-to-peer (P2P) architecture used by BitTorrent, but will apply it to both file transfer and messaging:

Total decentralization: No data will pass through a centralized server (tracker, messaging server, or storage server).

Data Segmentation: Files and messages must be fragmented into small chunks to enable simultaneous, fault-tolerant transfer.

Distribution by Nodes: Each machine (node) participating in the network is both a client and a server. Nodes are responsible for distributing and sharing data chunks.

AI Assistance (via Gemini API): Integration of the Gemini API into the encrypted messaging feature. Gemini's AI will need to be able to intervene in the discussion (for example, following a tag) to provide contextual assistance, similar to Meta AI's intervention in WhatsApp discussions.

Hackathon Sponsors

Prizes

3 non-cash prizes
Google Cloud and MLH Swag
1 winner

Prizes will be awarded to the top three groups following the hackathon.

Google Cloud and MLH Swag
1 winner

Prizes will be awarded to the top three groups following the hackathon.

Google Cloud and MLH Swag
1 winner

Prizes will be awarded to the top three groups following the hackathon.

Devpost Achievements

Submitting to this hackathon could earn you:

Judges

Kokou Adjétey Eric-Gratien BOKORVI

Kokou Adjétey Eric-Gratien BOKORVI

José Quam TOFFA

José Quam TOFFA

Fulgence AMANI

Fulgence AMANI

Judging Criteria

  • Security and Cryptography
    Robustness and efficiency of the end-to-end encryption mechanism. Relevance and innovation of the solutions proposed for peer authentication.
  • Functionality
    Does the protocol correctly implement file transfer and messaging? Does the system operate stably without an Internet connection?
  • Architecture and Design
    Code quality (readability, modularity), clarity and completeness of protocol documentation, compliance with the decentralized BitTorrent model.

Questions? Email the hackathon manager

Tell your friends

Hackathon sponsors

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.