Now Accepting Beta Testers

Stealth by Design
Communication Made Invisible

End-to-end encrypted chat, voice, and video that breaks the surveillance model. No tracking. No logs. No identity required.

Be among the first to experience true privacy. Limited spots available.

The Problem:
The "Traceability Trinity"

Ever chatted about a product only to see an ad for it the next day? This isn't magic—it's a structural flaw in modern apps.

Traditional apps like WhatsApp control three things at once, making your privacy impossible to protect.

Why You Are Tracked

1

The Path

They own the "road" your data travels on

2

The Action

They see exactly what you click and do inside the app

3

The Identity

They know who you are via phone number or email registration

The Story of Ben and Alex

1

The Chat

Ben sends Alex a message: "Costco has Japanese grapes on sale for 50% off"

2

The Trap

When Alex clicks the link, the app's AI connects the dots. It knows what he clicked (Action) and who he is (Identity).

3

The Consequence

The next day, Alex receives a targeted ad from Whole Foods. Ben gets the same ad just for being part of the conversation.

The Truth: As long as one company holds all three keys (Path, Action, and Identity), your privacy is impossible to protect.

The "Decoupled" Architecture

We fix this by splitting the three keys apart. No single person or company—not even us—has the full picture.

1

Decoupled Path

We Don't Own the Road

Connect via third-party VPN (like OpenVPN) or your local network. The VPN sees you're connected, but can't see what you're doing in the chat.

2

Local Action

Stays on Your Phone

When you click a link, it happens directly on your device in LAN-mode. Neither the VPN nor Primes Lab can record this action.

3

No Identity

We Don't Know Who You Are

No registration. No email. No phone number. You exist like a digital phantom—impossible to link actions back to you.

True Stealth

The Traceability Trinity is broken. Monitoring, logging, or targeting users is virtually impossible.

X

No Tracking

We can't track you because we don't control the network

X

No Logs

We can't record your actions because they happen locally

X

No Ads

We can't target you because we don't know who you are

X

No Registration

No email, phone number, or identity required to use

Full-Featured Communication

High-bandwidth Wi-Fi/VPN transport for real-time chat, voice, and video.

💬

Encrypted Messaging

Secure text messaging that runs locally on your device. No central servers logging your conversations.

🎙️

WebRTC Voice Calls

Crystal-clear voice calls via LAN or VPN. Stable throughput designed for real-time communication.

📹

HD Video Calls

Multi-guest video sessions with high bandwidth support. Perfect for secure team collaboration.

Ad-Hoc Chat vs. Mesh Apps

A detailed look at architectural differences

Capability Mesh Apps (e.g., Bitchat) Ad-Hoc Chat
Connectivity BLE mesh, proximity-dependent LAN/VPN, network-agnostic
Bandwidth Low throughput (text only) High throughput (multimedia)
Voice Calls Not supported WebRTC integration
Video Calls Not supported HD multi-party sessions
Privacy Model No registration required No registration + decoupled architecture
Reliability Mesh density dependent Consistent, topology-independent
Access Control Basic channel passwords Configurable auth & policy enforcement

From the Founder

"Privacy isn't a feature. It's a fundamental right."

Built by the CTO of Kingston Technology, Ad-Hoc Chat was created with one mission: to give people back control of their digital conversations through architecture that makes surveillance impossible.

Ready to Go Invisible?

Join the beta and be among the first to experience stealth communication.