Security at the Core
A deep dive into the technology that keeps your communications and transfers private.
Privacy Transfer Protocol
Xent's privacy transfer protocol is an overlay mechanism that never touches, custodies, or pools your funds. Instead, it creates an encrypted tunnel between your chat and your existing decentralized wallet, ensuring that on-chain transactions cannot be linked back to your chat identity.
End-to-End Encryption
Every message, file, voice call, and transfer receipt is encrypted on your device before transmission. Our servers only process encrypted blobs -- the plaintext content is never accessible to us, our infrastructure providers, or any third party.
Key Management
Cryptographic keys are generated and stored exclusively on your device. Private keys are never uploaded to any server. Key rotation and session key derivation follow industry-best practices to ensure long-term security.
Data Handling
Xent follows a strict data minimization philosophy. We collect the absolute minimum metadata necessary for message relay, and all message content is encrypted end-to-end. Stealth mode and timed destruction ensure physical-level data elimination.
Threat Model
Xent is designed to protect against a comprehensive range of threats including server compromise, network surveillance, device seizure, and social engineering attacks.
Trust & Transparency
We believe in verifiable security. Review our detailed documentation and third-party audit reports.