Privacy Whitepaper
Technical Architecture & Privacy Protocols
Version 1.0 -- March 2026
Abstract
Xent introduces a novel approach to private communications by combining end-to-end encrypted messaging with an overlay privacy transfer protocol. Unlike custodial solutions, Xent acts as a privacy layer that invokes users' existing decentralized wallets, ensuring that communication metadata and financial transactions remain completely unlinkable.
1. Architecture Overview
Xent employs a client-heavy architecture where all encryption, key management, and sensitive operations occur on the user's device. The server infrastructure functions purely as an encrypted relay, processing only encrypted blobs without the ability to inspect content. The privacy transfer module operates as an independent overlay that interfaces with external wallet providers through standardized protocols.
2. Privacy Transfer Protocol
The privacy transfer protocol generates encrypted transfer intents that decouple chat identity from wallet addresses. When a user initiates a transfer, the protocol creates a one-time encrypted session between the sender's chat client and their wallet application. The recipient's wallet address is never exposed in plaintext within the chat system. On-chain, the transaction appears as a standard peer-to-peer transfer with no linkable metadata.
3. Threat Model & Mitigations
Our threat model considers server compromise, network-level surveillance, device seizure, and social engineering as primary attack vectors. Mitigations include: E2E encryption for data in transit, device-level encryption for data at rest, zero-knowledge server architecture, DID-based identity to eliminate phone number vectors, and physical data destruction for stealth mode communications.
4. Conclusion
Xent represents a fundamental shift in secure communications for professionals who require both privacy and transaction capability. By acting as a privacy overlay rather than a custodial service, Xent eliminates the trust assumptions inherent in existing solutions while providing a seamless user experience.