Documentation

HOW
SPECTRE
WORKS

A complete guide to the ghost network. Encrypted communications over mesh radio, settled on Solana. No internet. No trace.

01

OVERVIEW

SPECTRE is a privacy-first communication platform that operates completely off-grid. Unlike traditional messaging apps that rely on cell towers and internet infrastructure, SPECTRE uses LoRa mesh radio networks to transmit encrypted data.

The Problem

Every message you send through traditional apps passes through centralized servers. Your metadata, location, contacts, and communication patterns are logged, analyzed, and stored. Even "encrypted" apps can be compromised at the infrastructure level.

The Solution

SPECTRE eliminates the middleman entirely. Your device connects directly to other devices through mesh radio nodes. No servers. No ISP logs. No cell tower records. The only record is a cryptographic commitment on Solana that reveals nothing about the sender, receiver, or content.

02

WHY
SPECTRE?

See how SPECTRE compares to the messaging apps you think are private.

Feature
Telegram
Signal
SPECTRE

End-to-End Encryption

Messages encrypted client-side

⚠️

Optional only

Always on

Always on

Works Without Internet

Operates off-grid

Requires internet

Requires internet

Mesh radio

No Central Servers

Fully decentralized

Cloud servers

Signal servers

P2P mesh

Metadata Protection

Hides who talks to whom

Logs everything

⚠️

Sealed sender

Hash commitments

No Phone Number

Anonymous signup

Required

Required

Wallet only

Fully Open Source

Verifiable code

⚠️

Client only

Full stack

Full stack

Private Payments

Send value anonymously

No

⚠️

MobileCoin

Solana + ZK

Censorship Resistant

Cannot be shut down

Banned in countries

⚠️

Domain fronting

Radio waves

Full support
⚠️Partial/Limited
Not supported

The only messaging platform that works when everything else is down.

SPECTRE is live on Solana Devnet
03

ENCRYPTION

All data leaving your device is encrypted with military-grade cryptography before transmission. Even if someone intercepts your radio signals, they see nothing but random noise.

Key Exchange

X25519 ECDH

Elliptic Curve Diffie-Hellman key exchange. Each conversation generates a unique shared secret without ever transmitting the key.

Message Encryption

XSalsa20-Poly1305

Authenticated encryption using the NaCl library. 256-bit security with built-in message authentication to prevent tampering.

Identity Commitment

SHA-256 Hash

The recipient's identity is never stored on-chain. Only a salted hash commitment is recorded, which only the intended recipient can claim.

Private Transfers

ZK-SNARKs

Zero-knowledge proofs hide sender, receiver, and amount for financial transactions. On-chain data reveals nothing.

04

MESH
NETWORK

SPECTRE operates on LoRa (Long Range) radio technology using the open-source Meshtastic protocol. This creates a decentralized mesh network where each node can relay messages to others.

How Mesh Routing Works

1

Device Broadcasts

Your encrypted message is broadcast on the LoRa frequency. Any nearby node can receive it.

2

Multi-Hop Relay

Nodes automatically relay the message. Each hop can be kilometers apart. No single node knows the full path.

3

Gateway Bridge

A gateway node bridges the mesh to Solana RPC for blockchain settlement. The gateway only sees encrypted data.

4

Recipient Decrypts

Only the intended recipient has the private key to decrypt the message. Everyone else sees noise.

10+ km

Range per hop

915 MHz

LoRa Frequency

0 ISP

Internet required

05

BLOCKCHAIN
SETTLEMENT

SPECTRE uses Solana for on-chain settlement of call escrows and financial transactions. The blockchain provides cryptographic proof without revealing any identifying information.

What Goes On-Chain

Callee Commitment Hash

SHA-256(callee_pubkey + salt). Cannot be reversed to reveal recipient.

Escrow Amount

Bond posted by caller, released when call is accepted or returned if declined.

Ticket Status

Pending, Accepted, or Cancelled. No call content or timing metadata.

What NEVER Touches Chain

xRecipient wallet address
xMessage content
xCall duration or timing
xIP addresses or location
xDevice identifiers
xCommunication metadata
06

PRIVACY
MODEL

SPECTRE implements defense in depth. Multiple layers of protection ensure that even if one layer is compromised, your communications remain private.

L1

End-to-End Encryption

Messages encrypted on your device. Only the recipient can decrypt. Not even gateway nodes can read content.

L2

Mesh Anonymity

Messages hop through multiple random nodes. No single node knows the full path from sender to receiver.

L3

On-Chain Privacy

Commitment-based identity hiding. ZK proofs for financial transactions. Nothing links you to your activity.

L4

No Infrastructure Logs

No servers means no logs. No ISP involvement means no traffic analysis. Radio waves leave no trace.

07

GETTING
STARTED

Ready to break free from surveillance? Here's how to get started with SPECTRE.

1. Connect Wallet

Install Phantom wallet and connect to the SPECTRE station. Your wallet is your identity. No email, no phone number, no KYC.

Station > Connect Wallet > Approve Connection

2. Create Profile

Register your call profile on-chain. This creates a PDA (Program Derived Address) that stores your public key for receiving encrypted messages.

Station > Settings > Create Profile

3. Add Contacts

Add contacts by their Solana wallet address. You can give them nicknames that are stored locally and never touch the blockchain.

Station > New Chat > Enter Wallet Address

4. Start Communicating

Send messages, make voice calls, or transfer funds. Everything is encrypted and routed through the mesh network.

Select Contact > Type Message > Send

Ready to Disappear?

Join the ghost network. No trace. No compromise.

Open Station