TECHNOLOGY

Technology

Defense-grade encryption meets ultra-efficient communication. Built for environments where every byte matters and every message must be protected.

03 / 08
Post-Quantum Cryptography

Post-quantum,from day one.

The same caliber of post-quantum key exchange that ships in Apple iMessage and Signal — delivered commercially. libsignal-client (Rust FFI) + PQXDH (ML-KEM-1024 / NIST FIPS 203 Level 5) gives Arc design-level resistance against "Harvest Now, Decrypt Later."

AUDITED CODEBASE FROM SIGNAL FOUNDATION

Key Exchange
PQXDH
Post-Quantum Extended Diffie-Hellman
Lattice KEM
ML-KEM-1024
NIST FIPS 203 Level 5

Signal Foundation audited cryptographic stack

Librarylibsignal-client (Rust FFI)
RatchetDouble Ratchet + Sender Keys
SignatureXEdDSA
MetadataSealed Sender
Self-implemented CryptoForbidden
01

Ultra-Low Bandwidth Communication

Arc uses Opus codec at 16kbps — the same approach as WhatsApp — to deliver voice messages at 1/8th the size of traditional AAC encoding. Combined with WebP image compression (30% reduction) and Proto3 binary serialization, Arc operates reliably on 3G networks and satellite connections.

Voice Message Compression

File size per minute of voice recording

AAC 128kbps
960 KB/min
AAC 64kbps
480 KB/min
Opus 16kbps
120 KB/min
Arc (Opus)
120 KB/min

8x smaller

NetworkSpeedVoice (1 min)Photo (500KB)
5G100 Mbps+<1s<1s
4G LTE10 Mbps<1s<1s
3G1 Mbps<1s~4s
2G / EDGE50 kbps~20s~80s
Satellite (LEO)25 Mbps<1s<1s
BLE Mesh1 Mbps<1s~4s
02

5-Phase E2EE Pipeline

Every message passes through five cryptographic phases before reaching the recipient. Each phase addresses a distinct threat vector, providing defense-in-depth that no single algorithm can achieve alone.

Phase 1

PQXDH

Post-quantum key exchange with ML-KEM-1024 hybrid

Phase 2

Double Ratchet

Forward secrecy — unique key per message, immediate deletion

Phase 3

AES-256-GCM

Authenticated encryption with 256-bit keys

Phase 4

AEGIS

Per-message XEdDSA digital signatures (via libsignal) (Arc original)

Phase 5

Sealed Sender

Sender identity hidden from server infrastructure

03

Post-Quantum Cryptography

ML-KEM-1024

Security LevelNIST Level 5
Classical EquivalentAES-256
Public Key1,568 bytes
Ciphertext1,568 bytes
FoundationFIPS 203

Hybrid Design

Arc combines classical and post-quantum cryptography. Even if one algorithm is broken, the other maintains security. This dual-defense protects against both today's threats and tomorrow's quantum computers.

X25519 ECDH (classical)
+
ML-KEM-1024 (quantum-resistant)

⚠️ Protects against "Harvest Now, Decrypt Later" attacks — adversaries who record encrypted traffic today to decrypt with future quantum computers.

04

AEGIS (Arc Enhanced Guard & Integrity System) ARC ORIGINAL

AEGIS (Arc Enhanced Guard & Integrity System) attaches a cryptographic XEdDSA signature (via libsignal) to every single message. Neither Signal nor WhatsApp offer per-message digital signatures. AEGIS provides legally admissible proof of message origin, tamper detection, and non-repudiation.

// Signature payload
XEdDSA.Sign(senderId || timestamp || content)
// 64-byte Ed25519 signature
Authentication

Cryptographic proof of sender identity

Tamper Detection

Any modification detected instantly

Non-Repudiation

Sender cannot deny message origin

05

BLE Mesh Network ARC ORIGINAL

Offline E2EE

Full end-to-end encryption over Bluetooth Low Energy. No internet, no cell towers, no servers. The only major messenger with offline encrypted communication.

Ephemeral Zones

Automatically create temporary communication zones during disasters. Map evacuation points, medical stations, and resource distribution centers in real-time.

Zero-Knowledge Presence

Prove you're nearby without revealing your exact location. Privacy-preserving proximity verification for trust establishment.

06

IGF (Instant Gone Forever)

Time-limited messages with cryptographically guaranteed deletion. Even on the free Essential plan, users can configure expiry from 1 minute to 52 weeks. Device-level deletion is instant regardless of plan.

Essential (Free)Daily batch deletion (00:00 JST)
Premium4x daily (every 6 hours)
IntelligenceReal-time deletion (seconds)
07

On-Device AI

AI runs entirely on your device. Zero server communication. Your conversations never leave your phone — not even for AI processing.

Gemma 4 (4B) — Pet Companion
Coming Soon
Pet AI companion — fully on-device, zero cloud API
Rosetta (TranslateGemma 4B)
Coming Soon
55-language offline translation
Summa — Document Intelligence
Coming Soon
Upload PDFs, presentations, and documents for AI-powered summaries, deep insights, and perspectives — processed entirely on-device. Plus instant AI summaries for URLs via Gemini. Intelligence plan feature.
08

How Arc Compares

Independent review comparing Arc V2 against 16 competitors (Signal, iMessage, WhatsApp, Telegram, LINE, Threema, Wire, Element, Session, Viber, XChat, KakaoTalk, Slack, Discord, Chatwork, Google Messages) using an 8-axis 100-point rubric.

09

Use Cases

Healthcare

Challenge

Patient data communication must comply with HIPAA and privacy regulations while remaining fast enough for clinical workflows.

  • E2EE + PQC protects patient data against current and future threats
  • IGF configurable auto-deletion (1 min to 52 weeks) for sensitive clinical discussions
  • AEGIS signatures provide legal audit trail for clinical decisions
  • Opus 16kbps enables voice messages in poor-reception hospital zones

Disaster Response

Challenge

Communication infrastructure is destroyed. Rescue teams need secure coordination without cell towers or internet.

  • BLE Mesh creates ad-hoc networks without infrastructure
  • Ephemeral Zones map evacuation and medical aid points
  • 120KB/min voice — usable on survival-grade bandwidth

Field Operations

Challenge

Remote sites with no connectivity need data collection, team coordination, and secure communication with headquarters.

  • Offline-first design: record locally, auto-sync on reconnect
  • BLE Mesh for team communication across large sites
  • Environmental sensors, quality tracking, and time management
10

Standards & Compliance

🇺🇸NIST CSF 2.0

Cybersecurity framework for critical infrastructure

🇺🇸NIST SP 800-53

Security and privacy controls for federal systems

🇺🇸FIPS 140-3

Cryptographic module validation (pending)

🇺🇸FIPS 203 (ML-KEM)

ML-KEM post-quantum key encapsulation standard

🌐ISO/IEC 27001

International information security management

🇪🇺GDPR

EU data protection and privacy regulation

🇬🇧UK Cyber Essentials+

UK government-backed cyber security certification

🇺🇸HIPAA

Design-ready for healthcare data protection

Read the Full Security Whitepaper

Dive deeper into Arc's cryptographic design, threat model analysis, and compliance documentation.