Live on Devnet

TheFirstTruly
Untraceable
CommunicationProtocol

Neither the sender, the receiver, the content, nor the fact that communication occurred are detectable.

Solana · ZK-SNARKs · E2E Encrypted · Open Source

100%

Untraceable

< 400ms

Latency

0

Metadata

ZK

Protected

GhostDrop Protocol
Scroll
Built withSolanaAnchorNaClCircomGroth16TauriNext.js

0%

Untraceable

Zero metadata leaks

< 0 min

Message Life

Configurable TTL

0

Metadata

By design

Anonymity

Proven

ZK

Protected

On-chain


Core Features

Why Ghost Drop?

Every layer engineered for one purpose — invisible communication.

Stealth Wallets

Every message from a unique ephemeral wallet. Zero address reuse, zero trails.

Encrypted Pools

Messages dissolve into shared cipher pools. Mathematically unreadable.

Auto-Destruct

Messages self-destruct after reading or configurable TTL. Zero recovery.

Traffic Noise

Millions of daily decoy transactions. Real messages hidden in phantom traffic.

Zero-Knowledge

Prove membership without revealing identity. Groth16 ZK-SNARKs on-chain.

Multi-Relay

Messages routed through distributed nodes. Your location is never exposed.


How It Works

Four steps to invisible

From typing to total disappearance. Every step removes another trace.

01

Generate Identity

Local keypair. No email, no KYC. Keys never leave your device.

02

Encrypt Message

X25519 + XSalsa20-Poly1305. Only the recipient can decrypt.

03

Stealth Deposit

Fresh ephemeral wallet deposits ciphertext into the on-chain pool.

04

Vanish

12+ decoys broadcast. ZK proof verified. Message delivered. No trace.

ghostdrop-cli v1.0.0
_

Live Simulation

See the Noise in Action

Every 2 seconds, a burst floods the network — only one is real.

Real message (1)
Decoy traffic (8-14)
Relay node

8-14

Decoys / msg

Phantom traffic per real message

0%

Distinguishable

Cryptographically identical

< 400ms

Latency

Real-time despite obfuscation


Comparison

GhostDrop vs the rest

We protect everything — including the fact you communicated at all.

Feature
GhostDrop
Signal
Telegram
Session
Sender anonymity
On-chain encryption
No metadata stored
Auto-destruct
ZK membership proofs
Traffic obfuscation
Stealth addresses
Decentralized
Open source

Cryptography

Technology Stack

Battle-tested, peer-reviewed, open-source cryptography. No proprietary algorithms.

All systems operational

Devnet active. Full pipeline functional.

01

X25519 Key Exchange

Elliptic-curve Diffie-Hellman. Unique shared secret per message.

02

XSalsa20-Poly1305

Authenticated encryption. 256-bit keys, tamper-proof.

03

Groth16 ZK-SNARKs

Constant-size membership proofs. Sub-second verification.

04

Poseidon Hash

ZK-optimized hash. 1M+ anonymous participants.

05

Solana Runtime

400ms blocks, sub-cent fees, parallel execution.


Tokenomics

$GHOST Token

Stake to use. First 7 days pay micro-fees, then unlimited forever.

1B

Total Supply

100

Min Stake

7d

Maturity

After 7d


Development

Roadmap

Transparent progress. Verifiable milestones.

Phase 01Done

Foundation

  • Anchor contracts
  • Message pool
  • Stealth wallets
  • E2E encryption
Phase 02Done

Core Protocol

  • Cipher pools
  • $GHOST token
  • Stake-to-Use
  • Auto-destruct
Phase 03Done

Privacy

  • ZK-SNARKs
  • Circom circuits
  • Traffic noise
  • Relay routing
Phase 04Active

Application

  • Chat UI
  • Contacts
  • Desktop app
  • Mobile PWA
Phase 05Next

Governance

  • ZK voting
  • Staking
  • Proposals
  • Treasury
Phase 06Next

Expansion

  • Mainnet
  • Bridges
  • Relays
  • Dev SDK

Ready to Disappear?

Enter the GhostNet. Your messages exist only for the intended eyes.

Enter the GhostNet
GitHub