If you’re new to this document, sections 7.5 and 7.7 are some of the coolest - it lets you build your own efficient handshake pattern based on who needs to prove what about each other’s identity, whether the static keys are pre-known, etc. A colleague put me on to Noise Explorer which has some nice diagrams.
This came up in another forum, specifically as an alternative to TLS.
It’s already been submitted, with no comments, so I’m interested if it’s had more traction, or if people have worked with it.
Noise is used by Wireguard. So in that regard it certainly has traction.
It is also used by ipfs to setup encrypted network links between peers.
Also Signal, the encrypted messaging app.
No, but those are related:
What parts of the Signal Protocol use Noise?
If you’re new to this document, sections 7.5 and 7.7 are some of the coolest - it lets you build your own efficient handshake pattern based on who needs to prove what about each other’s identity, whether the static keys are pre-known, etc. A colleague put me on to Noise Explorer which has some nice diagrams.