Users expect their data to be available on all their devices—phone, tablet, and laptop. Traditionally, this is achieved by uploading all data to a central cloud server. But if the goal is absolute privacy and zero-cloud architecture, how do we sync without a central authority seeing the data?
The Sync Paradox
The paradox is simple: Synchronization requires a common state, but privacy requires that no third party holds that state. At Locikit, we solve this using Conflict-Free Replicated Data Types (CRDTs) combined with End-to-End Encrypted (E2EE) transport layers.
The Role of CRDTs
CRDTs allow multiple devices to make changes to the same data independently and merge those changes later without conflicts. Instead of sending the "final state," devices send "operations" (e.g., "Add item X to list"). Because these operations are commutative, the order doesn't matter—every device eventually reaches the same state.
E2EE Transport: The Blind Pipe
The synchronization layer acts as a "blind pipe." Whether it's a peer-to-peer connection via libp2p or a relayed sync via an untrusted storage provider (like a personal Dropbox or an encrypted S3 bucket), the intermediary never sees the content. The keys to unlock the CRDT operations live only on your authorized devices.
Device Handshakes
When you add a new device to your Sovereign Stack, a secure handshake occurs. Using X3DH (Extended Triple Diffie-Hellman), the devices establish a shared secret. This secret is then used to derive the keys for the CRDT operation logs.
Why We Avoid Central Relays
Central relays, even if they only handle encrypted data, are still metadata targets. They know when you sync, how much you sync, and where you are. Our long-term vision for Locikit is to prioritize Local-Network P2P and Mesh Networking for synchronization, further reducing the reliance on any internet-connected intermediary.
- No Central Master: Every device is a peer; there is no "source of truth" other than the merged operation log.
- Offline-First: Sync happens whenever a connection is available—be it local Wi-Fi, Bluetooth, or the internet.
- Zero-Metadata Sync: By using P2P protocols, we minimize the digital footprint left on ISP or cloud logs.
Building the Sovereign Future
Multi-device support shouldn't come at the cost of your soul. By combining advanced distributed systems theory (CRDTs) with hardened cryptography, we are proving that convenience and privacy are not mutually exclusive. The cloud is just someone else's computer—it's time you used yours instead.