

20 languages, worldwide.
BUILT FOR THE WORLD, FROM JAPAN.
Product Identity
Privacy First
E2EE is free for everyone. No backdoors. No metadata harvesting. Client-side Sealed Sender hides even the sender from our servers.
Post-Quantum Ready
ML-KEM-1024 hybrid key exchange protects against future quantum computer attacks. NIST FIPS 203 certified, Level 3 security.
Read-or-Lose Encryption
Messages unread for 24 hours become mathematically undecryptable. Not deleted — the decryption key itself is destroyed. No court order, server subpoena, or device seizure can reconstruct the content.
Offline Capable
BLE Mesh Network enables encrypted communication without internet via Bridgefy SDK encryption. The BLE range limitation (10-30m) provides an additional physical security layer. Essential for disaster scenarios and remote areas.
Wine Community
Arc targets wine lovers and winery professionals with Winery Mode for field work management, combining privacy with community.
AI Characters & On-Device AI
6 cloud AI characters plus on-device AI powered by Gemma — Summa document intelligence, Rosetta offline translator, and AI pets — all running entirely on your phone with zero cloud exposure.
Read-or-Lose Encryption
Read it, or lose it.
Messages unread for 24 hours become mathematically undecryptable. Not deleted — the decryption key itself is destroyed. No court order, server subpoena, or device seizure can reconstruct the content.
Mathematical Guarantee
Not policy, not promise — the math itself prevents recovery. No court order, server subpoena, or device seizure can reconstruct the content.
Transparent Unread Status
Both sender and recipient see when a message expired unread. Like a missed call log — you know it happened, but the content is gone forever.
Works With IGF
Read-or-Lose protects the 24h before reading. IGF (up to 52 weeks) protects the plaintext after reading. Two independent layers of privacy.
When Messages Vanish, Beautifully
Goodbye, with style.
When an IGF (Instant Gone Forever) message reaches its expiry, it doesn't just disappear — it dissolves with a short themed animation in your chosen color, with symbols that match each theme's spirit.
48 Variations
Four motion patterns (bloom / burst / spiral / fade) combined with twelve theme symbol sets give you 48 unique disappearance moments at random.
Theme-Specific Symbols
Each theme has its own glyph palette: clouds and stars for Sky, wine glasses and barrels for Cave, code rain for Matrix, and so on. Every disappearance feels personal.
Right Before Expiry
The animation fires 1.2 seconds before the message vanishes — long enough to notice, short enough to feel like a graceful exit.
Reactions That Come Alive
Tap. Surprise. Repeat.
Some reaction icons unlock special animations when sent. Even the same icon can play multiple random patterns — a small delight every time you react.
Flower Reactions
20 floral icons trigger 6 random animation patterns: bloom, burst, petal storm, spiral, float-up, and fireworks.
Wine Reactions
Wine-themed icons trigger 4 random animations celebrating wine culture: pour, cheers, cork pop, and bottle spin.
30% Surprise
Animations trigger 30% of the time — frequent enough to delight, rare enough to feel special.
Security Without Compromise
Signal Protocol as the foundation, enhanced with three proprietary security layers.
Multi-Layer E2EE
PQCPQXDH (X25519 + ML-KEM-1024) key exchange, Double Ratchet, AES-256-GCM encryption, AEGIS XEdDSA message signatures, and Client-Side Sealed Sender.
Mesh Network
BLE-based offline communication protected by Bridgefy SDK encryption. The BLE range limitation (10-30m) adds a physical security layer. No internet required — ideal for disaster scenarios and remote areas.
IGF (Ignite the Fire)
Our proprietary timed-deletion system. Messages are completely erased from all devices and servers — gone forever.
Key Sync
Securely transfer encryption keys between devices using QR codes. X25519 ECDH + AES-256-GCM encrypted transfer with 5-minute session TTL.
AEGIS Signatures
XEdDSA per-message digital signatures via libsignal prevent impersonation and tampering. AEGIS (Arc Enhanced Guard & Integrity System) provides cryptographic non-repudiation on every message.
Sealed Sender
Client-side sender anonymization. Even the server cannot see who sent a message. Ephemeral X25519 key per message + HKDF-SHA256.
Summa — Document Intelligence
AIComing SoonUpload PDFs, presentations, and documents for AI-powered summaries, deep insights, and perspectives — processed entirely on-device. Plus instant AI summaries for URLs via Gemini. Intelligence plan feature.
How Arc Compares
Every messaging app makes trade-offs. Arc doesn't.
vs Signal
Good — but Arc goes further
Phone is the master device
✓ All devices equal — no primary required
Limited cloud backup only (PIN-required)
✓ Full encrypted backup, multi-device restore
History grows forever
✓ Auto-purged by IGF
No offline messaging
✓ BLE Mesh — works without internet
vs WhatsApp
Familiar — but Meta owns your metadata
Metadata collected by Meta
✓ Zero metadata logging
Backup unencrypted by default
✓ E2EE backup, always
Backup unencrypted by default
✓ True E2EE backup, always enabled
No post-quantum protection
✓ ML-KEM-1024 (PQXDH)
vs Telegram
Convenient — but not truly private
E2EE only in Secret Chat
✓ All chats E2EE by default
Server can read regular messages
✓ Zero server content access
Messages stored on Telegram servers
✓ User-controlled encrypted sync
No post-quantum protection
✓ ML-KEM-1024 (PQXDH)
AI Characters & On-Device AI
Sommelier, healthcare, fortune, fitness, and more — meet Arc's cloud AI characters plus on-device AI powered by Gemma.
Explore Arc
Tips & FAQs
Everything you need to know about Arc's features and security.
Reaction Icons
100 unique reactions including wine-themed and flower collections.
AI Characters
Cloud AI characters and on-device AI — discover the full lineup.
Security
Arc Protocol: Signal Protocol (libsignal) as the foundation, with PQXDH (ML-KEM-1024) post-quantum cryptography, XEdDSA signatures, and client-side Sealed Sender.
Key Sync
Transfer your encryption keys to a new device using QR codes. X25519 ECDH key exchange + AES-256-GCM encrypted transfer.
Pricing
Full E2EE on every plan. Security is never behind a paywall.
Winery Mode
Professional vineyard management with offline-first architecture.
Tracker
Smart habit and health tracking with E2EE protection.

















