Glossary · Bry_NFET_SX
Bry_NFET_SX
Are We Friends?'s internal name for our end-to-end encryption stack — XChaCha20-Poly1305 + X25519 + Argon2id.
Bry_NFET_SX (pronounced "Bry-NFET-SX") is the internal name for the cryptography stack that powers Are We Friends?'s end-to-end encrypted DM system. It's built from well-vetted, IETF-recommended primitives:
- Symmetric encryption: XChaCha20-Poly1305 (AEAD, 256-bit keys, 192-bit nonces) - Asymmetric key exchange: X25519 sealed boxes (Curve25519 ECDH) - Key derivation: Argon2id (memory-hard, 64 MB cost) - Forward secrecy: per-thread ephemeral keys with periodic re-keying
The "NFET" suffix refers to Bryan Leonard's complexity research framework (Non-Equilibrium Field Theory) — naming the encryption stack after the same theoretical work that informed the matching algorithm. Both treat compatibility as vector overlap in a high-dimensional space, where the encryption work happens to be defined over a very different vector space than the personality matching.
Bry_NFET_SX is the same set of primitives Signal, WireGuard, and modern TLS use. It's not novel cryptography — by design. New crypto is dangerous; standard primitives composed correctly is the safe play.
Related terms
End-to-end encryption (E2EE)
A messaging architecture where only the two parties can decrypt a message. The server never sees plaintext. Friends? DMs use this.
XChaCha20-Poly1305
An authenticated symmetric encryption algorithm used to encrypt every Are We Friends? DM payload.
X25519
An elliptic-curve key agreement protocol. Are We Friends? uses it to wrap the per-thread DM keys.
Argon2id
A memory-hard password-hashing function. Are We Friends? uses it to derive your master encryption key from your passphrase.
Give it five minutes
Meet people who actually fit — and do something real.
Free tier, Big Five test, three matches nearby. No ads, ever.