X
Xent
End-to-End Encrypted


Your Business. Your Privacy. Perfectly Aligned.

9:41

Alex Chen

Encrypted

The 50K USDT is ready. Can we settle now?

9:38 AM

Sure, sending now via privacy tunnel.

9:39 AM

Privacy Transfer

50,000 USDT

Confirmed on-chain
$
Message...
Core Innovation

Stop Trading in the Open.

When you share wallet addresses in a regular chat app, you're broadcasting your business relationships and real identity to the entire blockchain.

We don't hold your funds. We cloak your transfers.

Xent is not another custodial wallet that requires you to memorize a new seed phrase. It's an overlay privacy transfer tunnel that seamlessly invokes your existing MetaMask, TokenPocket, or Trust Wallet.

Non-custodial architecture
Compatible with MetaMask, TP, Trust Wallet
Zero fund pooling, zero intermediaries
9:41

OTC Desk Alpha

E2E Encrypted

Address and amount confirmed. Please proceed.

Initiating privacy transfer...

Privacy Transfer Tunnel
You
OTC

50,000 USDT

Via MetaMask

The Transfer Flow, Perfected.

Three moments. One seamless handoff.

Step 1

Initiate

Say goodbye to copy-pasting addresses.

Tap the payment icon inside a private conversation. The recipient's address is already encrypted at the protocol level. No plaintext addresses ever appear in your chat history.

9:41

Buyer Alpha

Ready to receive. Go ahead.

Tap to send payment...
Step 2

Invoke & Settle

Peer-to-peer. Real-time. On-chain.

Instantly invoke your trusted decentralized wallet. Real-time peer-to-peer on-chain settlement. No fund pools, no custody, no third party can ever touch your assets.

9:41

MetaMask

Confirm Transaction

Send to

0x9f8e...3d2a

Amount

50,000 USDT

Step 3

The Traceless Loop

Physically sever the link between funds and identity.

Funds arrive instantly. A dynamic interactive receipt appears in the chat. Then, the chat history and receipt are physically destroyed on schedule. On-chain, there's a transfer -- but no one knows who made it, or why.

9:41
Transfer Receipt
Verified

50,000 USDT

TX: 0xab12...ef89

Anti-forgery watermark active

Auto-destroy in 3s

How the Privacy Transfer Works

A six-step process that ensures your funds and identity remain completely separate.

01

User A initiates payment in private chat

02

Encrypted transfer intent generated

03

Invoke existing wallet (MetaMask / TP / Trust)

04

Peer-to-peer on-chain settlement

05

Verifiable receipt generated

06

Messages & receipts physically destroyed

NO custody
NO pooled funds
NO intermediary
Identity

Whether it's Telegram or WhatsApp, phone number registration makes you vulnerable to social engineering databases that can trace your real identity.

No Phone Number Required. Ever.

Say goodbye to identity anxiety. Generate a unique encrypted identity (DID) with one tap. Your social graph is physically severed from your real-world identity. Your name is defined only by you.

9:41

Your Encrypted Identity

xent:did:0x7f3a...e9b2

Identity Generated
No phone number needed
Stealth

Critical business negotiations, passwords, and key instructions left in chat history can become evidence for blackmail or investigation at any time.

Conversations that Leave No Trace.

This isn't your ordinary message recall. In stealth mode, all text, images, and files are physically destroyed after the set timer. Nothing persists on any cloud server -- not even in the recipient's local device database.

9:41

Stealth Room

Auto-destroy ON

Account: 6225xxxx Password: Xk9$mP

Destroying in 5s

Transfer 280K to this account.

Destroying in 3s
Shield

Even with disappearing messages, the other party can still secretly screenshot and forward your conversations.

What Happens Here, Stays Here.

System-level screenshot and screen recording prevention (Android / specific modes). When someone tries to capture sensitive information, all they get is a pure black image. Your business secrets will never appear in someone else's feed.

9:41

Screenshot Blocked

Content protected by Xent Shield

Screenshot attempt detected

Only a black image was captured

Tunnel

After agreeing on a price in chat, you still have to switch apps, open a wallet, copy a long address -- error-prone and exposing associations.

Send Value as Easily as a Message.

We don't touch your funds. We're simply an ultra-smooth tunnel. Invoke mainstream wallets (MetaMask, TP, etc.) directly from the chat -- no address copying, instant peer-to-peer transfer, funds arrive directly in the recipient's wallet.

9:41

Trading Partner

Price confirmed. Send 100K USDT.

Select Wallet

MetaMask
TokenPocket
Trust Wallet
Receipt

After every transfer, you send an easily-forged blockchain explorer screenshot. Low efficiency and zero trust.

The Only Receipt You Can Trust.

Once the transaction is confirmed on-chain, an exquisite, unforgeable interactive dynamic receipt is automatically generated in the chat. Tap to verify payment status. This isn't just a transfer receipt -- it's the ultimate expression of your professionalism.

9:41
Xent Transfer Receipt
Verified

50,000.00 USDT

TxHash:0xab12...ef89

From

0x7f3a...1d9e

To

0x9c2b...4a7f

Tap to verify on-chain

Radar

OTC traders fear receiving tainted funds the most -- it can freeze your entire account without warning.

Know Your Transaction, Before It Happens.

This is more than chat. Our underlying probes provide fund purity and risk detection when you generate a transfer receipt (optional service). Intercept freeze risks at the very last second before settlement.

9:41

Pre-Transaction Scan

CLEAN

Fund chain verified safe

Source address purity
OFAC sanctions check
Mixer detection
Safe to proceed
Isolation

Work, personal life, and different client channels all mixed together. One wrong message and you expose client relationships.

Compartmentalize Your Work.

Seamlessly switch between different identities (DIDs). Create fully isolated workspaces for escrow deals, upstream channels, and core teams. Even if your phone is inspected, inactive workspaces remain absolutely invisible.

9:41

Workspaces

Escrow Deals

3 active

Upstream OTC

7 contacts

Core Team

5 members

Hidden Workspace

Requires PIN

Encryption

Many mainstream apps claim encryption but still have backdoors or cloud backup vulnerabilities.

Default Privacy. Zero Compromise.

No complex setup required. Every message, voice call, and file is encrypted with the most rigorous protocol the moment it's sent. Not even our own engineers can peek into your conversations.

9:41

const msg = 'Hello';

const key = generateKey();

const cipher = encrypt(msg, key);

// output: 0x8f3a...e2b1

Every message encrypted by default

How End-to-End Encryption Works

Your messages are encrypted on your device and can only be decrypted by the intended recipient.

01

Plaintext message

02

Encrypted on device

03

Transmitted as ciphertext

04

Server sees only encrypted blob

05

Decrypted on recipient's device

Not even our own engineers can peek into your conversations.

Ecosystem

When you need overseas numbers, VPNs, or specific compliance services, searching for them in the open is extremely unsafe.

More Than Chat. An Ecosystem of Utilities.

Your exclusive privacy app store is coming soon. Seamlessly access top-tier privacy tools and compliance services in an absolutely secure sandbox environment -- all supporting encrypted in-network payments.

9:41

Privacy App Store

Verified & Sandboxed

Virtual SIM

Anonymous phone numbers

Secure Vault

Encrypted file storage

Global VPN

Private browsing

ID Verifier

KYC without exposure

Sovereignty

After profiting on the front end, there's no equally secure cold storage to safely park your high-net-worth earnings.

From Fluidity to Fortitude. Connect to AIGIS.

As a front-end gateway, Xent will seamlessly connect to the underlying sovereign asset cold vault (AIGIS). Your business flow will receive bank-grade physical isolation and deep settlement here. Front office to back office -- a perfect closed loop.

9:41
X
Xent Gateway

Front-end: Messaging + Transfers

AIGIS Cold Vault

Back-end: Sovereign Asset Storage

Bank-grade physical isolation
Vault

Phone lent to someone, left on a desk unlocked, or forced to open your chat app -- your core clients and sensitive flows exposed instantly.

Your Device is Open. Your Business is Not.

Dual defense: App-level independent PIN protection. Even when your phone is unlocked, entering Xent requires secondary verification (Face ID / Fingerprint / independent numeric PIN).

Contact-Level Lock: For high-risk / high-net-worth contacts (escrow agents, large fund upstreams), set an independent disguise PIN. Without this PIN, the contact and all chat history completely vanish from the list -- as if they were never added.

9:41

Conversations

Team Channel

Meeting at 3pm

2m

Trading Group

Market update posted

15m
Enter Secret PIN

VIP Escrow Agent

250K USDT receipt

Trusted by Thousands Worldwide

Growing every day with professionals who value privacy above all else.

0+

Users Joined

0+

Countries & Regions

$0+

Daily Transfer Volume

0+

Daily Conversations

Backed by the Best

Trusted by leading technology, security, and investment partners.

Technology Partners

ChainLink
Infura
Alchemy
Polygon
Cloudflare

Security Partners

CertiK
SlowMist
Trail of Bits
Halborn

Top Investors

Sequoia
a16z Crypto
Paradigm

What Our Users Say

Trusted by OTC traders, escrow agents, and high-net-worth individuals worldwide.

"Xent completely changed how I handle OTC deals. The privacy transfer tunnel means I never have to expose wallet addresses in chat again."

A

Alex K.

OTC Trader / Hong Kong

"The burnable rooms feature is exactly what I needed. After each deal, everything disappears -- like it never happened. True operational security."

S

Sarah M.

Escrow Agent / Dubai

"Finally a messenger that understands the needs of high-value transactions. The interactive receipts alone saved me hours of verification work."

J

James L.

Asset Manager / Singapore

Frequently Asked Questions

Everything you need to know about Xent.

Experience the new standard of business communication.

Download Xent today and take control of your privacy.