Skip to main content

Beginner Questions

Every blockchain transaction is public. If someone sends you crypto, anyone watching the chain can trace that payment back to you, see your balance, and track your activity.SPECTER solves this by creating one-time stealth addresses for every payment. The sender creates a fresh address that only the recipient can discover — observers see the transaction, but can’t figure out who received the funds.
No. You can use the frontend app and the API without any crypto knowledge. The cryptography runs in the background — you interact with simple API calls like “generate keys” and “create stealth address.”If you’re curious, the What is SPECTER? page has expandable sections that explain the crypto in simple terms.
Follow this path:
  1. What is SPECTER? — understand the concept in 5 minutes
  2. Explore the product — see it work in the live app
  3. Integration quickstart — run the API loop yourself
None of those. SPECTER is a privacy protocol — a set of tools (API, frontend, CLI) that generate private receiving addresses. It works on top of existing blockchains (Ethereum, Sui). You use your own wallet to send and receive funds — SPECTER just makes the addresses private.
Current encryption (like the kind used in Bitcoin and Ethereum) could be broken by future quantum computers. SPECTER uses ML-KEM-768, the NIST-standardized (FIPS 203) post-quantum encryption standard specifically designed to resist quantum attacks. This means your privacy stays safe even in a post-quantum world.
Yes! Just click Launch app and explore the full flow in your browser. No local setup, no downloads, no wallet required for testing.

Integration Questions

The core integration loop uses exactly 4 endpoints:
StepEndpointPurpose
1POST /api/v1/keys/generateGenerate recipient keys
2POST /api/v1/stealth/createCreate stealth payment
3POST /api/v1/registry/announcementsPublish announcement
4POST /api/v1/stealth/scanDiscover payments
That’s it. Everything else (ENS, SuiNS, IPFS, Yellow) is optional and builds on this core.
No. The SPECTER API is stateless and does not include authentication. Add auth and rate limiting at your API gateway, reverse proxy, or application layer based on your security requirements.
The tx_hash field serves as a unique identifier for duplicate protection in the registry. In production, this would be the actual on-chain transaction hash. For testing, you can use any unique hex string.
Common causes:
  • Wrong keys — the viewing/spending keys don’t match what was used during creation
  • Missing publish step — the announcement was never published to the registry
  • Payload mismatch — the fields sent to scan don’t match what was published
  • Registry reset — the in-memory registry resets when the server restarts
Fix: Re-run the Integration quickstart steps in exact order with fresh keys.
Yes. SPECTER’s API is a standard REST API — call it from any language or framework. Common integration patterns:
  • Node.js/Python backend → Call SPECTER API via HTTP from your server
  • Frontend dApp → Call SPECTER API directly or through your backend proxy
  • Mobile app → Same as frontend, use HTTP requests
See the Integration playbook for detailed patterns.
  • API: Best for production apps. Your backend calls SPECTER endpoints programmatically.
  • CLI: Best for local testing, demos, CI/CD pipelines, and support debugging.
Most teams use the API for production and CLI for development/QA.

Product & Frontend Questions

Yes! Use the Launch app button and follow the Explore product guide. The hosted frontend connects to the live backend — no installation required.
Use the CLI when you need:
  • Scripted automation — reproducible test flows
  • CI/CD integration — smoke tests in your pipeline
  • Support playbooks — reproducing user issues locally
  • Benchmarking — the CLI includes a bench command for performance testing
Use the API when your backend needs to:
  • Control payment workflows programmatically
  • Handle multi-user scenarios (e.g., a wallet serving many recipients)
  • Integrate with existing services deterministically
  • Process payments without user interaction
The frontend is a standard web app and works in mobile browsers. It’s optimized for desktop but functional on mobile screens.

Security & Privacy Questions

The spending secret key is used locally during the scan operation. The API does receive it for the scan endpoint in the current implementation — in a production deployment, you would perform scanning client-side or in a trusted enclave.
SPECTER uses ML-KEM-768, a NIST-standardized post-quantum algorithm. Even with a quantum computer, an attacker cannot break the encryption to link payments to your identity. This is unlike classical stealth address protocols that rely on elliptic curves.
Currently, the registry supports two modes:
  • In-memory — for development and testing (resets on server restart)
  • File-based — for persistent local storage
On-chain registry storage is a future enhancement on the roadmap.

Chain & Compatibility Questions

Currently: Ethereum and Sui. The core cryptography is chain-agnostic — only name resolution (ENS vs SuiNS) and on-chain settlement differ between chains.
Solana is on the roadmap but not yet implemented. Current backend flow focuses on Ethereum and Sui.
Yes. SPECTER includes ENS resolution — senders can look up a recipient’s meta-address using their .eth name instead of pasting a long key. See the ENS setup guide.
Yes. Sui name resolution works the same way as ENS — look up meta-addresses by .sui names. See the SuiNS setup guide.

Current Scope Questions

No. The following are planned but not yet built:
  • OAPA (One Address Per Application)
  • PQ account abstraction wallet
  • Privacy keystore
  • Migration contracts
See the Roadmap for full details and priority.
Not yet. The Yellow close flow currently returns placeholder transaction fields and depends on external Yellow Network processing. This is functional for testing the API contract.
The file-based registry is suitable for local development and testing. For production use, you’d want a database-backed registry with proper replication and access controls.