BlackMist is a professional-grade privacy tool designed to bridge the gap between high-level anonymity networks and OS-level networking. Unlike standard browser-based solutions, BlackMist orchestrates the Tor Expert Bundle to enforce a global proxy state across the entire Windows environment.
💡 Engineering Decision: The core is built with Go to leverage low-level system calls (Win32 API) for registry manipulation, ensuring that the proxy toggle is atomic and leaves no room for IP leaks during state transitions.
The interface, prototyped on Figma, focuses on "One-Click Security". It provides a minimalist aesthetic while maintaining real-time technical feedback (Bootstrap progress, Circuit latency). The core challenge was synchronizing the backend Tor process state with the frontend UI.
| 🔴 Mode: Offline (Exposed) | 🔵 Mode: Online (Secured) |
|---|---|
![]() |
![]() |
| The proxy is disabled. The system IP is exposed (Status: Red). | Tor is bootstrapped. System traffic is routed (Status: Blue). |
Pro Tip: I implemented a Bootstrap Guard in Go. The system proxy is only engaged once the Tor circuit reaches 100% connectivity, preventing any data leaks (DNS or Traffic) during the handshake phase.
BlackMist interacts directly with the OS Layer to ensure total traffic encapsulation:
- Process Orchestration: Secure spawning of the Tor child process with detached handles.
- Dynamic Configuration: Generation of volatile configuration files to ensure a Zero-Log footprint.
- Signal Communication: Implementation of the Tor Control Protocol to allow real-time identity rotation (NEWNYM).
| Layer | Technologies |
|---|---|
| Backend Core | Go (Golang) 1.21+ |
| Frontend Framework | React / TypeScript / Tailwind CSS |
| Native Bridge | Wails v2 (Context binding & Events) |
| Security Layer | Tor Expert Bundle, Windows Registry API |

