DoubleTrack Browser is a radical experiment in digital identity management. While most privacy tools focus on hiding your data, DoubleTrack takes the opposite approach—it deliberately creates a rich, consistent, but entirely fictional digital presence alongside your real one.
"The best place to hide a leaf is in a forest."
This project is built on a hybrid architecture that prioritizes both performance and memory safety:
-
Rust Core: Powers the profile generation and activity simulation engine, compiled to WebAssembly for browser integration
-
ReScript: Type-safe browser API integration and UI components (compiles to JavaScript)
-
Deno: Modern runtime for build scripts and development tooling
-
WebExtensions API: Provides the hooks needed for background operation
-
Parallel Identity Generation: Creates believable, consistent alternative browsing patterns
-
Background Activity Engine: Simulates browsing behavior even when you’re not actively using your computer
-
Memory-Safe Design: Uses Rust’s ownership model to ensure your real data remains protected
-
Configurable Noise Levels: Adjust how active your alternative identity should be
In a world where your data is constantly harvested, the traditional approach of trying to hide becomes increasingly futile. Data brokers have become too sophisticated, tracking technologies too pervasive.
DoubleTrack explores a different hypothesis: What if, instead of trying to be invisible, you become deliberately, strategically visible—but in ways that obscure rather than reveal?
# Clone the repository
git clone https://github.com/hyperpolymath/double-track-browser.git
cd double-track-browser
# Check dependencies
just install
# Build everything (Rust + ReScript + Extension)
just build
# Or without just:
deno task buildThen load the extension from the dist/ directory into your browser’s developer mode.
This is experimental software. While designed with security in mind, it may have unintended consequences for your online experience. Use at your own risk and only on personal devices.
This project adheres to the Rhodium Standard Repository (RSR) Framework and achieves Gold Level compliance (91%):
-
✅ Documentation: README, LICENSE, SECURITY, CODE_OF_CONDUCT, CONTRIBUTING, MAINTAINERS, CHANGELOG
-
✅ .well-known/: RFC 9116 security.txt, ai.txt (AI training policy), humans.txt (attribution)
-
✅ Type Safety: Rust compile-time guarantees + ReScript type system
-
✅ Memory Safety: Rust ownership model, zero unsafe blocks
-
✅ Build System: Deno, wasm-pack, justfile, Mustfile.epx
-
✅ CI/CD: GitHub Actions with security audits, linting, and testing
-
✅ Test Coverage: Comprehensive tests (Rust + Deno)
-
✅ Offline-First: Zero network dependencies, works air-gapped
See RSR_COMPLIANCE_AUDIT.md for detailed audit.
This project follows the Hyperpolymath Standard language policy:
-
ReScript instead of TypeScript
-
Deno instead of npm/Node.js
-
Rust for performance-critical code
-
justfile instead of Makefile
See .claude/CLAUDE.md for the complete policy.
This project uses the TPCF to manage trust and contributions:
-
Access: Open to all
-
Scope: All public contributions
-
Requirements: Follow Code of Conduct, sign commits (optional)
-
Review: All PRs reviewed before merge
-
Access granted after sustained contributions (3+ months, 10+ merged PRs)
-
Code review privileges, issue triage, mentoring
-
Invitation-only for long-term maintainers
-
Strategic decisions, governance, security response
Current Status: Only Perimeter 3 is active. See MAINTAINERS.md for details.
Contributions are welcome! This project values:
-
Reversibility: Experiments should be safe to try and easy to undo
-
Emotional Safety: No blame culture, mistakes are learning opportunities
-
Diverse Expertise: All skill levels welcome
-
Sustainable Pace: No crunch time, life comes first
See CONTRIBUTING.md for guidelines and CODE_OF_CONDUCT.md for community standards.
See SECURITY.md for vulnerability reporting procedures and our security model. We follow responsible disclosure with a 90-day coordinated release window.
Quick contacts:
-
Security issues: security@example.com (see .well-known/security.txt)
-
Code of Conduct: conduct@example.com
This project is dual-licensed:
-
MIT License (primary) - see LICENSE-MIT
-
Palimpsest License v0.8 (alternative) - see LICENSE-PALIMPSEST
You may choose either license. See LICENSING.md for details.
"In the age of surveillance capitalism, visibility can be a form of camouflage."