Protects free speech
Talk in a room built for the conversation itself, not for distribution, engagement, profiling, or later inspection.
Encrypted rooms for free speech. No accounts, no usernames, no telemetry, no permanent chat history.
NullTrace is not a feed with privacy bolted on. It is infrastructure for people who need to speak freely and leave no platform-owned trail behind.
Talk in a room built for the conversation itself, not for distribution, engagement, profiling, or later inspection.
Entry happens through a temporary invite capsule. You approve participants instead of publishing to an audience you do not control.
Messages are encrypted in your browser before they move. The server passes encrypted traffic; it is not a place where readable conversations live.
No permanent chat archive, no ad profile, no account timeline. NullTrace is built for conversations that happen, serve their purpose, and disappear.
Free speech needs more than a policy promise. NullTrace makes the room technically hard to abuse: approve entry, encrypt locally, rotate keys, store no readable history.
Encrypt first. End-to-end encryption starts locally, before a message leaves your device.
Hybrid keys. X25519 and ML-KEM combine classical speed with post-quantum resilience.
Short-lived entry. Invite capsules are signed, time-limited, and useless once they expire.
Approved members. Participants enter through verified handshakes and fresh room keying.
Less traffic leakage. Padding and encrypted chaff reduce what packet size alone can reveal.
One active session. Access is limited so quiet account sharing and invisible parallel use get harder.
In modern life, Signal should be the baseline for normal conversations with friends and family. Technology is too advanced, too connected, and too observable for ordinary messaging to be casual anymore. But when something must not become identity, notification, backup, device history, or future evidence, it belongs in NullTrace.
No. NullTrace does not need usernames, phone numbers, email addresses, or a public profile. Access is controlled by your user key and restore key, so the product can stay focused on rooms and encryption instead of identity collection.
No readable chat history is stored for NullTrace to browse later. Message content is encrypted before transport, sent as protected room traffic, and only the approved participants in that room are meant to decrypt it.
You can lose access. Save both keys somewhere offline before continuing. If it happens, contact us and we can look at what is still possible, but the system is intentionally designed so keys matter.
Invite as many people as the room needs. Every approved participant is brought into the encrypted session through the room flow, with membership changes driving fresh key material instead of turning the conversation into a public channel.
Plan
Exact SOL amount
Deposit address
Waiting for payment...
Anyone with these keys can access or reset your NullTrace access. Store them offline. If your restore key is exposed, someone can revoke your current session.
This access is currently active somewhere else. Enter your restore key to move access here. The old session will be logged out.
User key
Restore key
Quantum-ready · RAM-only · Zero telemetry
Start a secure channel, invite with a one-time capsule, let messages auto-burn.
X25519 + ML-KEM-512 for long-term secrecy and post-quantum resilience.
Signed handshake transcript + short SAS check to block invisible MITM.
XChaCha20-Poly1305 with per-sender sequence & epochs. Strict AAD binds sender/seq/epoch.
Initiator-driven on join/leave. Per-peer sealed GK distribution.
NT-C1 invites: signed, TTL-locked, size-padded. One-time room tokens at the WS edge.
Uniform 3–5 KB frames; encrypted chaff; server sinks noise.
Per-class quotas (chat / control / bulk). Back-pressure without drops.
No persistence. No telemetry. Hardened headers & strict CSP.
Approvals, SAS verify, burn timer, deadman switch, one-tap wipe.
ct; rekeys and distributes sealed GK.{type,cid,seq,epoch}.gk_req to resync.