Technology That Disappears
Your phone, laptop, watch and sensors form a private mesh - no cloud, no logins, no middleman.
When technology works for you instead of harvesting your data, it gets out of the way.
Early development - everything here is experimental
What is Reality2?
A mobile-first mesh protocol for phones, wearables and IoT. Your devices find each other, prove who they are, and communicate securely - without logins, without pairing screens, without a cloud in the middle. The same code runs on a $5 microcontroller, a phone, a laptop, a server, or inside your web browser.
No Friction
No passwords, no pairing dialogs, no login screens. Devices in a trust group recognise each other through cryptographic certificates. If you're a member, you're in. Authentication is invisible.
Any Device
One Rust codebase compiles to bare-metal microcontrollers (ESP32, RP2040), Linux SBCs (Raspberry Pi), desktop, mobile, and 70KB of WebAssembly in the browser. A $5 chip and a cloud VM are equal peers.
Any Transport
BLE, WiFi, LoRa, USB, WebSocket - R2 treats them all the same. Networks come and go. The system adapts, routes around failures, and strengthens paths that work.
No Cloud Dependency
The protocol runs on your devices. A relay helps with connectivity across the internet, but it's untrusted infrastructure - it forwards encrypted bytes it cannot read. Your data never touches someone else's server.
Technology that stays calm - working quietly in the background, only stepping forward when it genuinely needs your attention. Technology that adapts - finding new paths when old ones fail, strengthening connections that matter, letting go of ones that don't. Digital sovereignty - real control over your own identity, data, and relationships - made practical.