White Paper

Stealth by Design

How Primes Lab Ad-Hoc Chat Makes Communication Invisible — A deep dive into the architecture that breaks the surveillance model.

1

The Problem: The "Trinity Trap"

Have you ever chatted about a product—like grapes at Costco—only to see an ad for it the very next day? This isn't magic; it's a structural flaw in modern apps called the "Traceability Trinity."

In traditional apps (like WhatsApp), a single company controls three things at once:

🛤️

The Path

They own the "road" your data travels on

👆

The Action

They see what you click and do

🪪

The Identity

They know who you are

The Story of Ben and Alex

💬
The Chat

1 The Conversation

Ben sends Alex a message: "Costco has Japanese grapes on sale for 50% off"

🪤
The Trap

2 The AI Connects the Dots

When Alex clicks the link to view the grapes, the app's AI knows what he clicked (Action) and who he is (Registered Identity).

📢
The Result

3 Targeted Advertising

The next day, Alex receives a targeted ad for Whole Foods. Ben gets the same ad just for being part of the conversation.

Marketing Truth: As long as one company holds all three keys (Path, Action, and Identity), your privacy is impossible to protect.

2

The Solution: The "Decoupled" Architecture

Primes Lab Ad-Hoc Chat fixes this by splitting the three keys apart. We call this "Decoupling." It means no single person or company—not even us—has the full picture.

How Decoupling Works

Three layers of separation ensure complete privacy

🌐

We Don't Own the Road Step 1

You connect via a third-party VPN portal (like OpenVPN) or your local network. The VPN sees you're connected, but cannot see what you're doing inside the chat.

Path Split
📱

What Happens Locally, Stays Local Step 2

When you click a link, the action happens directly on your device (LAN-mode). Neither the VPN nor Primes Lab can record this action.

Action Split
👻

We Don't Know Who You Are Step 3

No registration required. No email. No phone number. You exist like a digital phantom—impossible to link actions back to you.

ID Split
3

The Result: True Stealth

Because we separated the Path, the Action, and the Identity, the Traceability Trinity is broken. Primes Lab Ad-Hoc Chat is stealth by nature.

🚫

No Tracking

We can't track you because we don't control the network

📝

No Logs

We can't record your actions because they happen locally

📢

No Ads

We can't target you because we don't know who you are

Invisible

Monitoring, logging, or targeting is virtually impossible

4

Why Ad-Hoc Chat Is the Superior Choice

A clear comparison shows why Ad-Hoc Chat leads in private communication.

📡

Bitchat

BLE Mesh Protocol

Proximity Required: BLE range limits connectivity to nearby devices

Text Messaging: Bandwidth constraints restrict media support

No A/V Support: Architecture not designed for real-time streaming

Mesh Density: Reliability depends on node availability

Feature Bitchat Ad-Hoc Chat ✨
Connectivity ⚠️ Limited range ✓ Global reach via LAN/VPN
Bandwidth ⚠️ Low (text only) ✓ High-speed multimedia
Voice Calls ✗ Not supported ✓ Crystal-clear WebRTC
Video Calls ✗ Not supported ✓ HD multi-guest sessions
Privacy ○ No registration ✓ No registration + Decoupled
Reliability ⚠️ Mesh density dependent ✓ Enterprise-grade stability
Best For Nearby groups only Secure teams, global collaboration

Summary: While Bitchat excels in infrastructure-independent scenarios, Ad-Hoc Chat provides a more comprehensive solution for teams requiring voice, video, and enterprise-grade privacy controls.

Bitchat

Proximity-based mesh networking for offline text communication

Ad-Hoc Chat

Full-featured private communication with voice, video, and decoupled architecture

Ready to Experience True Privacy?

Join the beta and be among the first to communicate invisibly.

No spam. Just early access updates.