TECHNOLOGY

Technology

Defense-grade encryption meets ultra-efficient communication. Built for environments where every byte matters and every message must be protected.

01

Ultra-Low Bandwidth Communication

Arc uses Opus codec at 16kbps β€” the same approach as WhatsApp β€” to deliver voice messages at 1/8th the size of traditional AAC encoding. Combined with WebP image compression (90% reduction) and Proto3 binary serialization, Arc operates reliably on 3G networks and satellite connections.

Voice Message Compression

File size per minute of voice recording

AAC 128kbps
960 KB/min
AAC 64kbps
480 KB/min
Opus 16kbps
120 KB/min
Arc (Opus)
120 KB/min

8x smaller

NetworkSpeedVoice (1 min)Photo (500KB)
5G100 Mbps+<1s<1s
4G LTE10 Mbps<1s<1s
3G1 Mbps<1s~4s
2G / EDGE50 kbps~20s~80s
Satellite (LEO)25 Mbps<1s<1s
BLE Mesh1 Mbps<1s~4s
02

5-Phase E2EE Pipeline

Every message passes through five cryptographic phases before reaching the recipient. Each phase addresses a distinct threat vector, providing defense-in-depth that no single algorithm can achieve alone.

πŸ”‘
Phase 1

PQXDH

Post-quantum key exchange with ML-KEM-1024 hybrid

πŸ”„
Phase 2

Double Ratchet

Forward secrecy β€” unique key per message, immediate deletion

πŸ”’
Phase 3

AES-256-GCM

Authenticated encryption with 256-bit keys

βœ…
Phase 4

AEGIS

Per-message Ed25519 digital signatures (Arc original)

πŸ‘»
Phase 5

Sealed Sender

Sender identity hidden from server infrastructure

03

Post-Quantum Cryptography

ML-KEM-1024

Security LevelNIST Level 5
Classical EquivalentAES-256
Public Key1,568 bytes
Ciphertext1,568 bytes
FoundationFIPS 203

Hybrid Design

Arc combines classical and post-quantum cryptography. Even if one algorithm is broken, the other maintains security. This dual-defense protects against both today's threats and tomorrow's quantum computers.

●X25519 ECDH (classical)
+
●ML-KEM-1024 (quantum-resistant)

⚠️ Protects against "Harvest Now, Decrypt Later" attacks β€” adversaries who record encrypted traffic today to decrypt with future quantum computers.

04

AEGIS (Arc Enhanced Guard & Integrity System) ARC ORIGINAL

AEGIS (Arc Enhanced Guard & Integrity System) attaches a cryptographic Ed25519 signature to every single message. Neither Signal nor WhatsApp offer per-message digital signatures. AEGIS provides legally admissible proof of message origin, tamper detection, and non-repudiation.

// Signature payload
XEdDSA.Sign(senderId || timestamp || content)
// 64-byte Ed25519 signature
πŸ”“
Authentication

Cryptographic proof of sender identity

πŸ›‘οΈ
Tamper Detection

Any modification detected instantly

πŸ“œ
Non-Repudiation

Sender cannot deny message origin

05

BLE Mesh Network ARC ORIGINAL

πŸ“‘

Offline E2EE

Full end-to-end encryption over Bluetooth Low Energy. No internet, no cell towers, no servers. The only major messenger with offline encrypted communication.

🌈

Ephemeral Zones

Automatically create temporary communication zones during disasters. Map evacuation points, medical stations, and resource distribution centers in real-time.

πŸ‘οΈ

Zero-Knowledge Presence

Prove you're nearby without revealing your exact location. Privacy-preserving proximity verification for trust establishment.

06

IGF (Instant Gone Forever)

Time-limited messages with cryptographically guaranteed deletion. Even on the free Essential plan, users can configure expiry from 1 minute to 52 weeks. Device-level deletion is instant regardless of plan.

Essential (Free)Daily batch deletion (00:00 JST)
Premium4x daily (every 6 hours)
IntelligenceReal-time deletion (seconds)
07

On-Device AI

AI runs entirely on your device. Zero server communication. Your conversations never leave your phone β€” not even for AI processing.

Gemma 3n (4B)
Pet AI companion β€” fully on-device, zero cloud API
Rosetta (TranslateGemma)
55-language offline translation
08

How Arc Compares

SignalWhatsAppArc
Post-Quantum CryptoPartial (PQXDH)PQXDHPQXDH ML-KEM-1024
Per-Message Signature------AEGIS (XEdDSA)
Sealed SenderServer-side---Client-side
Offline Mesh E2EE------BLE Multi-hop E2EE
Voice CodecOpus 24kbpsOpus 16kbpsOpus 16kbps
Message ExpiryBasicBasicAdvanced (3-tier)
On-Device AI------Gemma 3n (4B)
E2EE Free for Allβœ“βœ“βœ“
09

Use Cases

πŸ₯

Healthcare

Challenge

Patient data communication must comply with HIPAA and privacy regulations while remaining fast enough for clinical workflows.

  • βœ“E2EE + PQC protects patient data against current and future threats
  • βœ“IGF configurable auto-deletion (1 min to 52 weeks) for sensitive clinical discussions
  • βœ“AEGIS signatures provide legal audit trail for clinical decisions
  • βœ“Opus 16kbps enables voice messages in poor-reception hospital zones
🌊

Disaster Response

Challenge

Communication infrastructure is destroyed. Rescue teams need secure coordination without cell towers or internet.

  • βœ“BLE Mesh creates ad-hoc networks without infrastructure
  • βœ“Ephemeral Zones map evacuation and medical aid points
  • βœ“120KB/min voice β€” usable on survival-grade bandwidth
  • βœ“Disaster coupon: time-limited free access for all users worldwide
πŸ‡

Field Operations

Challenge

Remote sites with no connectivity need data collection, team coordination, and secure communication with headquarters.

  • βœ“Offline-first design: record locally, auto-sync on reconnect
  • βœ“BLE Mesh for team communication across large sites
  • βœ“Environmental sensors, quality tracking, and time management
10

Standards & Compliance

πŸ‡ΊπŸ‡ΈNIST CSF 2.0

Cybersecurity framework for critical infrastructure

πŸ‡ΊπŸ‡ΈNIST SP 800-53

Security and privacy controls for federal systems

πŸ‡ΊπŸ‡ΈFIPS 140-3

Cryptographic module validation (pending)

πŸ‡ΊπŸ‡ΈFIPS 203 (ML-KEM)

ML-KEM post-quantum key encapsulation standard

🌐ISO/IEC 27001

International information security management

πŸ‡ͺπŸ‡ΊGDPR

EU data protection and privacy regulation

πŸ‡¬πŸ‡§UK Cyber Essentials+

UK government-backed cyber security certification

πŸ‡ΊπŸ‡ΈHIPAA

Design-ready for healthcare data protection

Read the Full Security Whitepaper

Dive deeper into Arc's cryptographic design, threat model analysis, and compliance documentation.