NullTrace

Private rooms for direct speech.

Send messages without accounts, phone numbers, feeds, ads, or platform profiling. Create a room, share an invite, talk freely, and leave no permanent chat history behind.

What it does

Private conversations

Rooms are created when you need them. No public profile, no social graph, and no inbox designed to keep you hooked.

Speech without audience capture

NullTrace is built for direct human communication, not algorithmic distribution. Say what you mean to the people you invited.

Keys stay with you

Access is controlled by your user key and restore key. Store them offline; they are your way back in.

Why it works

Messages are encrypted before they leave your browser.

Room invites are temporary and only useful to the person you share them with.

Sessions are limited so one access key cannot quietly run everywhere at once.

Traffic is padded and shaped so conversations reveal less from packet size alone.

FAQ

Do I need an account?

No. Access uses private keys instead of username/password accounts.

Can NullTrace read my messages?

The app is designed so message content is encrypted in the browser before transport.

What happens if I lose my keys?

You lose access. Save both keys somewhere offline before continuing.

Is this for large public groups?

No. It is built for private rooms and deliberate invites, not mass broadcast.

Choose access

Payment

Plan

Exact SOL amount

Deposit address

Waiting for payment...

Save your access keys

Anyone with these keys can access or reset your NullTrace access. Store them offline. If your restore key is exposed, someone can revoke your current session.

User key
Restore key

Sign In

Private rooms. Disposable identities.

Start a secure channel, invite with a one-time capsule, let messages auto-burn.

  • Post-quantum hybrid keying
  • Traffic shaping with chaff & padding
  • Burn timer · Deadman · One-tap wipe

Pending approvals

    Security Engine

    PQ-Hybrid from day one

    X25519 + ML-KEM-512 for long-term secrecy and post-quantum resilience.

    Identity-bound pairing

    Signed handshake transcript + short SAS check to block invisible MITM.

    Replay-proof AEAD

    XChaCha20-Poly1305 with per-sender sequence & epochs. Strict AAD binds sender/seq/epoch.

    Smart rekey

    Initiator-driven on join/leave. Per-peer sealed GK distribution.

    Access capsules

    NT-C1 invites: signed, TTL-locked, size-padded. One-time room tokens at the WS edge.

    Traffic shaping

    Uniform 3–5 KB frames; encrypted chaff; server sinks noise.

    Soft rate limits

    Per-class quotas (chat / control / bulk). Back-pressure without drops.

    RAM-only

    No persistence. No telemetry. Hardened headers & strict CSP.

    Safety UX

    Approvals, SAS verify, burn timer, deadman switch, one-tap wipe.

    How it works

    1. Host starts a room. Fresh keys; disposable room ID.
    2. Share an invite capsule. Signed NT-C1, TTL-bound, size-padded (no token inside).
    3. Guest pastes & confirms. Room + short SAS fingerprints for a quick human check.
    4. Hybrid handshake. X25519 + ML-KEM derive a shared secret; initiator signs the transcript.
    5. Host approves. Sends one-shot ct; rekeys and distributes sealed GK.
    6. Chat. AEAD with deterministic nonces; AAD over {type,cid,seq,epoch}.
    7. Membership change → new keys. Debounced rekey; guests can gk_req to resync.
    8. Traffic blended. Frames padded; encrypted chaff runs; server sinks noise.
    9. Clean exit. Burn timer, deadman, wipe. Nothing at rest.

    Share capsule

    Expires in 02:00

    Paste capsule

    Confirm Join

    Room:

    Host ID:

    Your ID: