|
| 1 | +name: solDM |
| 2 | +categories: |
| 3 | + - social-and-communications |
| 4 | + - infrastructure |
| 5 | + - applications |
| 6 | + - defi |
| 7 | +usecases: |
| 8 | + - infrastructure |
| 9 | + - messaging |
| 10 | +ecosystem: |
| 11 | + - solana |
| 12 | +description: solDM — a serverless, E2E-encrypted private chat with zk |
| 13 | + compression & quantum resistance on Solana (powered by Light Protocol) |
| 14 | +product_launch_day: 2026-01-02T21:00:00.000Z |
| 15 | +sunset: false |
| 16 | +assets_used: |
| 17 | + - sol |
| 18 | +have_token: false |
| 19 | +tokens: [] |
| 20 | +links: |
| 21 | + web: https://www.soldm.xyz/ |
| 22 | + blog: "" |
| 23 | + github: "" |
| 24 | + forum: "" |
| 25 | + docs: https://docs.soldm.xyz/ |
| 26 | + whitepaper: "" |
| 27 | + block_explorer: "" |
| 28 | + governance: "" |
| 29 | + twitter: https://x.com/solana_dms |
| 30 | + discord: "" |
| 31 | + telegram: https://t.me/solana_dms |
| 32 | + lens: "" |
| 33 | + farcaster: "" |
| 34 | +project_phase: mainnet |
| 35 | +project_status: |
| 36 | + live_status: true |
| 37 | + mainnet: true |
| 38 | + testnet: false |
| 39 | + version: mainnet |
| 40 | +blockchain_features: |
| 41 | + opensource: true |
| 42 | + upgradability: |
| 43 | + enabled: false |
| 44 | + asset_custody_type: non-custody |
| 45 | + encryption: E2E-encrypted chat with zk compression & quantum resistance (ML-KEM-768) |
| 46 | + p2p: true |
| 47 | +storage: |
| 48 | + decentralized: true |
| 49 | +privacy_policy: |
| 50 | + defined: false |
| 51 | + link: "" |
| 52 | + data_usage: None |
| 53 | +compliance: "" |
| 54 | +tracebility: |
| 55 | + kyc: false |
| 56 | + tracked_data: None |
| 57 | + sign_in_type_requirments: [] |
| 58 | +default_privacy: true |
| 59 | +audits: [] |
| 60 | +third_party_dependency: >- |
| 61 | + solDM is built natively on Solana and depends on a small number of external |
| 62 | + components: |
| 63 | +
|
| 64 | +
|
| 65 | + 1. Solana mainnet / RPC providers for submitting transactions and reading |
| 66 | + on-chain state |
| 67 | +
|
| 68 | + 2. Light Protocol for zk-compressed state (the message-state / inbox |
| 69 | + commitments are compressed and anchored on Solana via Light’s infrastructure). |
| 70 | +
|
| 71 | + 3. Dialect for optional wallet-native notifications (push/alerts for new |
| 72 | + message events without exposing plaintext) |
| 73 | +
|
| 74 | + 4. Content storage layer for ciphertext blobs (currently IPFS via Pinata in |
| 75 | + prototype). |
| 76 | +
|
| 77 | +
|
| 78 | + Critical note: encryption happens client-side, these dependencies don't have |
| 79 | + access to plaintext. |
| 80 | +social_trust: >- |
| 81 | + solDM does not custody user private keys. Message encryption keys live |
| 82 | + client-side only. |
| 83 | +
|
| 84 | +
|
| 85 | + We will run an external security audit and publish a threat model + audit |
| 86 | + summary. Open-sourcing is planned to make the system verifiable by the |
| 87 | + community. |
| 88 | +technical_spof: >- |
| 89 | + We’ve designed solDM to avoid “one server goes down → chat dies” and “one |
| 90 | + database leak → messages leak”, but there are still a few realistic failure |
| 91 | + modes to acknowledge: |
| 92 | +
|
| 93 | +
|
| 94 | + 1. If a user’s device/keystore is compromised, their messages can be decrypted |
| 95 | + (same as any E2EE system). |
| 96 | +
|
| 97 | + 2. Individual RPCs can rate-limit, but users can switch providers, the |
| 98 | + protocol does not require a single RPC. |
| 99 | +team: |
| 100 | + anonymous: false |
| 101 | + teammembers: |
| 102 | + - name: Jacks |
| 103 | + link: https://x.com/Encrypted_Jacks |
| 104 | + - name: Hash |
| 105 | + link: https://x.com/TheHashMiner |
| 106 | +funding: [] |
| 107 | +history: [] |
| 108 | +id: soldm |
0 commit comments