Private conversations
Rooms are created when you need them. No public profile, no social graph, and no inbox designed to keep you hooked.
Private rooms for direct speech.
Send messages without accounts, phone numbers, feeds, ads, or platform profiling. Create a room, share an invite, talk freely, and leave no permanent chat history behind.
Rooms are created when you need them. No public profile, no social graph, and no inbox designed to keep you hooked.
NullTrace is built for direct human communication, not algorithmic distribution. Say what you mean to the people you invited.
Access is controlled by your user key and restore key. Store them offline; they are your way back in.
Messages are encrypted before they leave your browser.
Room invites are temporary and only useful to the person you share them with.
Sessions are limited so one access key cannot quietly run everywhere at once.
Traffic is padded and shaped so conversations reveal less from packet size alone.
No. Access uses private keys instead of username/password accounts.
The app is designed so message content is encrypted in the browser before transport.
You lose access. Save both keys somewhere offline before continuing.
No. It is built for private rooms and deliberate invites, not mass broadcast.
Plan
Exact SOL amount
Deposit address
Waiting for payment...
Anyone with these keys can access or reset your NullTrace access. Store them offline. If your restore key is exposed, someone can revoke your current session.
This access is currently active somewhere else. Enter your restore key to move access here. The old session will be logged out.
User key
Restore key
Quantum-ready · RAM-only · Zero telemetry
Start a secure channel, invite with a one-time capsule, let messages auto-burn.
X25519 + ML-KEM-512 for long-term secrecy and post-quantum resilience.
Signed handshake transcript + short SAS check to block invisible MITM.
XChaCha20-Poly1305 with per-sender sequence & epochs. Strict AAD binds sender/seq/epoch.
Initiator-driven on join/leave. Per-peer sealed GK distribution.
NT-C1 invites: signed, TTL-locked, size-padded. One-time room tokens at the WS edge.
Uniform 3–5 KB frames; encrypted chaff; server sinks noise.
Per-class quotas (chat / control / bulk). Back-pressure without drops.
No persistence. No telemetry. Hardened headers & strict CSP.
Approvals, SAS verify, burn timer, deadman switch, one-tap wipe.
ct; rekeys and distributes sealed GK.{type,cid,seq,epoch}.gk_req to resync.