Spectre Wallet

Spectre
███████╗██████╗ ███████╗ ██████╗████████╗██████╗ ███████╗ ██╔════╝██╔══██╗██╔════╝██╔════╝╚══██╔══╝██╔══██╗██╔════╝ ███████╗██████╔╝█████╗ ██║ ██║ ██████╔╝█████╗ ╚════██║██╔═══╝ ██╔══╝ ██║ ██║ ██╔══██╗██╔══╝ ███████║██║ ███████╗╚██████╗ ██║ ██║ ██║███████╗ ╚══════╝╚═╝ ╚══════╝ ╚═════╝ ╚═╝ ╚═╝ ╚═╝╚══════╝ ██╗ ██╗ █████╗ ██╗ ██╗ ███████╗████████╗ ██║ ██║██╔══██╗██║ ██║ ██╔════╝╚══██╔══╝ ██║ █╗ ██║███████║██║ ██║ █████╗ ██║ ██║███╗██║██╔══██║██║ ██║ ██╔══╝ ██║ ╚███╔███╔╝██║ ██║███████╗███████╗███████╗ ██║ ╚══╝╚══╝ ╚═╝ ╚═╝╚══════╝╚══════╝╚══════╝ ╚═╝

ai-coordinated privacy infrastructure

invisible by design

stealth-native. self-sovereign. secured by ai

Spectre Welcome Screen Spectre Create Wallet Screen Spectre Set Pin Screen

wallet features

01

stealth architecture

no mempool, no metadata, no trace

02

wallet-as-node

your app relays, routes & encrypts

03

multi-chain native

one interface, many chains, zero bridges

04

biometric access

face id or touch id, local-only unlock

05

peer-to-peer bridge

secure cross-chain flow, no custody

06

ai coordination

agents optimize routing & execution

secure by design

01

on-device keygen

all keys are generated & stored locally—never leave your device

02

zero network exposure

no public rpc, no mempool, no address lookup—nothing to leak

03

encrypted routing

transactions are relayed through a wallet-native mixnet with layered encryption

04

ai-driven obfuscation

local agents randomize relay paths, timing & traffic patterns for maximum entropy

05

burn-based auth

access & coordination secured via economic cost, not identity

06

no custody. no memory.

you hold the keys. we hold nothing. spectre remembers nothing

Spectre Wallet: A Zero‑Metadata, Mixnet‑Routed Wallet Architecture for Humans and Autonomous Agents

Version 0.2 – Pre‑print for review

Please send comments to research@0xspectre.com. PDF source is available here.

Abstract

We present Spectre Wallet, a cryptographically hardened, metadata‑minimising wallet architecture that leverages the Nym mixnet, stateless client design, and an intent‑based agent interface. Unlike commodity non‑custodial wallets that leak IP addresses, behavioural fingerprints, and RPC endpoints, Spectre provides provable traffic unlinkability and formal anonymity guarantees. We model adversarial capabilities using a global passive adversary with partial network control, derive upper bounds on deanonymisation probability, and analyse performance overhead on commodity hardware. Our evaluation shows that Spectre decreases the adversary's deanonymisation advantage from ≈ 1 to <1⁄64 in a 10% compromised‑node scenario, at a median latency overhead of 320 ms. We further contribute a privacy‑preserving dApp gateway, post‑quantum signature support, and a security analysis conforming to Anderson's Saltzer‑style principles.

1. Introduction

Blockchains promise pseudonymity yet operational wallets routinely betray users. Empirical studies [6] show that MetaMask, Trust Wallet, and Phantom correlate wallet addresses with IP addresses through default RPC back‑ends, and embed analytics SDKs that fingerprint devices. Meanwhile, emerging use‑cases—autonomous trading agents, DAO executors, whistle‑blower payouts—require zero‑leak operational security (OpSec). Spectre Wallet re‑imagines the wallet as privacy infrastructure, not a convenience interface.

Contributions

  1. Threat‑model formalisation. We quantify metadata‑based deanonymisation probability under a global passive adversary.
  2. Architecture. We design a stateless client whose entire traffic surface is tunnelled through Nym's Sphinx‑based mixnet, with enforced cover traffic and decentralised RPC.
  3. Privacy‑preserving dApp gateway. Ephemeral CREATE2 wallets, mixnet‑proxied WebViews, and zk‑login optionality yield unlinkability across dApps.
  4. Security analysis & proofs. We bound adversary advantage δ(ρ) as a function of compromised mix nodes ρ.
  5. Performance evaluation. We prototype Spectre on iOS and Linux, measuring latency, bandwidth overhead, and entropy gain compared to MetaMask.

2. Background and Related Work

Mixnets. Sphinx [1] and Loopix [2] provide packet formats and cover‑traffic schemes for low‑latency anonymity. Nym extends Loopix with incentives and tokenised staking. Unlike Tor, mixnets inject delays to resist timing correlation.

Account‑abstraction wallets. ERC‑4337 [7] enables smart wallets but does not address metadata leaks. Prior work such as zkLogin (Mysten) focuses on identity proofs, not transport anonymity.

Spectre combines these strands, applying mixnet routing and stateless design to the wallet problem, something absent from existing literature.

3. Threat Model

Adversary 𝒜 controls a fraction ρ∈[0,1) of mix nodes and passively observes the remaining Internet. 𝒜 may collude with RPC providers and dApp servers and embeds fingerprint scripts in WebViews.

Goal. Given metadata vector M={m₁,…,mₖ}, infer the user identity u∈U.

Define deanonymisation probability

A(M) = Pr[𝒜⇒u|M]. (1)

Our target is to achieve

A(M) ≤ 1/|U| + δ(ρ), (2)

where δ(ρ) is negligible (<2⁻⁶) for ρ≤0.1.

Assumptions. End‑device is uncompromised; mixnet primitives are cryptographically sound; shielded gas pool is available for address funding.

4. System Design

4.1 Network Layer

Every packet follows Sphinx formatting and is delayed by an exponential timer of mean 1/λ. Aggregate latency is Erlang‑distributed:

T ~ Erlang(n,λ). (3)

We configure n=3, λ=2 s⁻¹ yielding median T₅₀=0.33 s.

Spectre dApp Interaction Architecture
Figure 1: Spectre dApp Interaction Architecture showing the flow from user intent through the stateless client, Nym mixnet routing, to privacy-preserving dApp interactions with ephemeral wallets.

4.2 Stateless Client & Storage Discipline

All persistent storage APIs are disabled (localStorage, IndexedDB). Keys reside in secure enclaves; crash logs are written only to volatile memory and wiped on exit.

4.3 RPC Layer

RPC calls are multiplexed over gRPC via Nym exit nodes to self‑hosted Ethereum, Arbitrum, and Avalanche nodes. Requests are batched in 200 ms windows to break burst‑profiling.

4.4 Agent Interface

Spectre implements an Intent RPC:

{
  "jsonrpc": "2.0",
  "method": "spectre_intent",
  "params": {
    "goal": "swap",
    "constraints": { "slippage": "<0.3%" }
  }
}

The wallet translates intents to transactions, applying formal policy guards.

4.5 Privacy‑Preserving dApp Gateway

For each dApp session d Spectre derives an ephemeral wallet wₐ via CREATE2(salt=d||t). Unlinkability:

U(D) = 1 - max_{dᵢ≠dⱼ} Pr(w_{dᵢ}=w_{dⱼ}|𝒜). (4)

Our analysis (§6) yields U(D)≥0.99 for ρ≤0.1.

4.6 Cryptographic Stack

Primitive Purpose Status
ECDSA‑secp256k1 Legacy chain compatibility ✔︎
Ed25519 Quick‑sign L2s ✔︎
Falcon‑1024 PQ signatures Prototype
Dilithium‑3 PQ signatures Prototype
Groth16 / PLONK ZK proofs for intents ✔︎

5. Security Analysis

5.1 Mixnet Unlinkability

Let V be the set of visible packet features. Following Díaz and Serjantov's metric, anonymity is

H(U|V) = -∑_{u∈U} Pr(u|V)log₂ Pr(u|V). (5)

With cover traffic rate μ and ρ=0.1 compromised nodes, simulations (10⁶ runs) show H(U|V)≥ log₂|U|-5.9 bits, equivalent to an anonymity set of ≥64 participants.

5.2 Address‑Funding Correlation

We employ a Zcash‑to‑L1 shielded pool; the linkability probability is bounded by the anonymity set of the join‑split pool, typically <2⁻²⁰.

5.3 Side‑Channel Evaluation

  • Browser finger‑prints (canvas, audio): blocked.
  • Timing attacks: batched RPC windows introduce ±200 ms jitter.

6. Performance Evaluation

6.1 Experimental Setup

  • Hardware: M1 MacBook, iPhone 15 Pro.
  • Baseline: MetaMask (Chrome v124) without VPN.
  • Metrics: RPC round‑trip, swap latency, bandwidth.

6.2 Results

Metric MetaMask Spectre Overhead
RPC RTT (ms) 90 ± 12 410 ± 38 4.6×
Swap (Uniswap v3) 1.2 s 1.52 s 1.3×
Bandwidth (MB·h⁻¹) 4.3 6.7 1.5×

Latency increase is dominated by mix delays; bandwidth overhead stems from cover traffic. Overheads are acceptable for human and agent workflows outside HFT.

7. Discussion & Future Work

We plan to:

  • Optimise mix parameters using adaptive Poisson sampling.
  • Integrate zk‑credential‑based rate‑limiting to curb spam without sacrificing anonymity.
  • Evaluate Falcon key storage in iOS Secure Enclave once Apple releases PQ APIs.
  • Investigate FHE‑based on‑device agent execution.

8. Conclusion

Spectre demonstrates that a fully functional wallet can provably minimise metadata without crippling usability. By fusing mixnet routing, stateless engineering, and agent‑centric APIs, we reduce deanonymisation probability to below 1.5%, establishing privacy as infrastructure rather than an optional feature.

References

[1] Danezis G., Goldberg I. "Sphinx: A Compact and Provably Secure Mix Format." IEEE S&P, 2009.

[2] Piotrowska A. et al. "Loopix: Practical Low‑Latency Anonymous Communication." USENIX Security, 2017.

[3] Kappos G. et al. "Empirical Analysis of Loopix‑Style Mixnets at Scale." PETS 2023.

[4] WalletConnect Foundation. WalletConnect v2 Specification, 2023.

[5] Jager T. et al. "Falcon: Fast‑Fourier Lattice‑Based Signatures." NIST PQC Round 3, 2022.

[6] Frel J. et al. "Web3 Fingerprinting Attacks." PETS 2024.

[7] Ethereum Foundation. "ERC‑4337: Account Abstraction via EntryPoint Contract," 2023.

Spectre App

coming soon

to an Apple App Store device near you.