SECURITY

Multi-Layer E2EE Architecture

Arc Protocol: Signal Protocol (libsignal) as the foundation, with PQXDH (ML-KEM-1024) post-quantum cryptography, XEdDSA signatures, and client-side Sealed Sender.

02 / 08
Read-or-Lose Encryption

Read it,or lose it.

Keys are destroyed in 24 hours. Even if the ciphertext remains, no means of decryption exists. To subpoenas, breaches, and future quantum computers — Arc replies "the data physically does not exist."

WORLD'S FIRST KEY-DESTRUCTION E2EE

📩

Receive

Key generated · 24h timer starts

24h elapsed

Still unread, 23 hours 59 minutes

🔥

Key destroyed

Mathematically impossible to decrypt

01

PQXDH Key Exchange

Hybrid post-quantum key exchange combining X25519 (Curve25519) and ML-KEM-1024 (NIST FIPS 203). Resistant to both classical and quantum attacks.

02

Double Ratchet

Per-message forward secrecy using DH ratchet + symmetric ratchet. Compromise of one key cannot decrypt past or future messages.

03

AES-256-GCM Encryption

Authenticated encryption with 256-bit keys. Each message encrypted with a unique key derived from the Double Ratchet.

04

XEdDSA Signatures (libsignal)

XEdDSA signatures via libsignal. Identity Key (X25519) doubles as signing key. Device list integrity verification included.

05

Client-Side Sealed Sender

Ephemeral X25519 key per message + HKDF-SHA256 derived AES key. Even the server cannot see who sent a message.

INDUSTRY FIRST

Read-or-Lose Encryption

Read it, or lose it.

Messages unread for 24 hours become mathematically undecryptable. Not deleted — the decryption key itself is destroyed. No court order, server subpoena, or device seizure can reconstruct the content.

How It Works

⏱️
24-Hour Key Lifetime

Every message is encrypted with a decryption key that lives for exactly 24 hours. After that, the key is cryptographically destroyed — on the sender's device, the recipient's device, and the server.

Read Before 24h

If you read the message within 24 hours, the plaintext is safely stored on your device per your IGF timer (up to 52 weeks on paid plans).

💨
Unread at 24h

If you don't read in time, the message becomes permanently unrecoverable. Even Atlas Associates cannot bring it back.

Read-Triggered Re-keying

The moment your inbox hits zero unread, your decryption key rotates immediately — maximizing forward secrecy.

Mathematical Guarantee

Not policy, not promise — the math itself prevents recovery. No court order, server subpoena, or device seizure can reconstruct the content.

📞

Transparent Unread Status

Both sender and recipient see when a message expired unread. Like a missed call log — you know it happened, but the content is gone forever.

Works With IGF

Read-or-Lose protects the 24h before reading. IGF (up to 52 weeks) protects the plaintext after reading. Two independent layers of privacy.

🎁

Free on Every Plan

Read-or-Lose is a core Arc Protocol feature — included at no extra cost on Essential, Premium, and Intelligence plans.

The Missed Call Metaphor

Imagine a phone call you didn't answer. The log remains — you know someone called. But the voice? Gone. Arc's unread messages work the same way: you see that a message arrived, but its content is irretrievably lost.

ARC ORIGINAL

AEGIS — Arc Enhanced Guard & Integrity System

AEGIS (Arc Enhanced Guard & Integrity System) is Arc's message authentication layer built on XEdDSA digital signatures via libsignal. Every single message you send is cryptographically signed, providing three critical guarantees:

Anti-Impersonation

Even if an attacker compromises the server, they cannot forge messages in your name. Your Identity Key (X25519) is used for XEdDSA signing and never leaves your device.

Tamper Detection

Any modification to a message — even a single character — instantly invalidates the signature. Recipients can verify that every message arrived exactly as sent.

Non-Repudiation

Cryptographic proof that you authored a message. XEdDSA uses your X25519 Identity Key for EdDSA-compatible signatures — no separate Ed25519 key needed.

XEdDSA (libsignal) · X25519 Identity Key · 64-byte signatures · Per-message signing

Unlike standard messaging apps, AEGIS goes beyond encryption. While E2EE protects message content, AEGIS protects message identity — ensuring that every message truly comes from who it claims to come from. Powered by libsignal's XEdDSA implementation.

Zero Key Conversion

Arc separates X25519 (key exchange) and Ed25519 (signatures) at the type level. Unlike Signal/WhatsApp, there is no Ed25519→X25519 key conversion, minimizing the attack surface.

Comparison with 17 Major Messengers

Independent review comparing Arc V2 against 16 competitors (Signal, iMessage, WhatsApp, Telegram, LINE, Threema, Wire, Element, Session, Viber, XChat, KakaoTalk, Slack, Discord, Chatwork, Google Messages) using an 8-axis 100-point rubric.

POST-QUANTUM

ML-KEM-1024 Parameters

NIST FIPS 203 standardized post-quantum Key Encapsulation Mechanism.

AlgorithmML-KEM-1024 (via libsignal-client)
NIST Security LevelLevel 3 (AES-192 equivalent)
Classical Security2^128 bit (X25519)
Quantum SecurityNIST Level 3
FoundationModule Lattice (FIPS 203)
Public Key Size1,184 bytes
Secret Key Size2,400 bytes
Ciphertext Size1,088 bytes

Compliance & Standards

🇺🇸NIST CSF 2.0

NIST framework. 6 functions for systematic cyber risk management.

🇺🇸NIST SP 800-53

Federal security controls. FedRAMP foundation.

🇺🇸FIPS 140-3

Federal cryptographic module validation. Covers ML-KEM-1024.

🇺🇸NIST SP 800-175B

Cryptographic algorithm selection guide. Based on FIPS 203.

🌐ISO/IEC 27001

International ISMS certification. B2B/B2G trust foundation.

🇪🇺GDPR

EU General Data Protection Regulation. World's highest protection standard.

🇬🇧UK Cyber Essentials+

UK government-certified cybersecurity certification.

🇬🇧NCSC Cloud Security

UK NCSC 14 Principles. Cloud security assessment standard.

Developed in compliance with all prerequisites of US NIST, EU GDPR, UK NCSC, and international ISO.

WHITEPAPER

Arc Protocol: Security Whitepaper

A comprehensive technical document describing Arc's cryptographic architecture, threat model, and security guarantees. Covers PQXDH key exchange (ML-KEM-1024), Double Ratchet forward secrecy, XEdDSA per-message signatures, Sealed Sender, and BLE Mesh offline communication.

15 Sections

Complete protocol documentation

Signal Comparison

Honest feature-by-feature analysis

Threat Model

STRIDE analysis with residual risks

CONFIDENTIAL

System Architecture Documentation

Complete technical specification of Arc V2 — covering the 5-layer architecture, E2EE pipeline, PQXDH implementation, key lifecycle, group encryption, multi-device architecture, BLE Mesh networking, and on-device AI.

15+ Technical Sections

Layer architecture, PQC implementation, encryption pipeline, data storage, and more

Bilingual (EN/JP)

Full documentation available in English and Japanese with one-click toggle

Version 3.1 — March 2026

Includes Elixir PreKey Server, Sealed Sender, Sender Keys, and PQXDH ML-KEM-1024

This document is classified as confidential and available exclusively to NDA-bound partners, investors, and authorized technical reviewers. Access requires prior approval by Atlas Associates.