Musk is working on XChat. What exactly is the Bitcoin-style encryption architecture?

avatar
深潮TechFlow
2 days ago
This article is approximately 1381 words,and reading the entire article takes about 2 minutes
X can not only send and read tweets, but may also gradually have instant messaging functions similar to Telegram or WeChat in the future.

Original author: TechFlow

On June 1, Musk began to make efforts and announced the launch of a new messaging system XChat on the X platform, featuring end-to-end encryption, disappearing messages, arbitrary file transfers, and cross-platform audio and video calls.

In other words, X can not only send and read tweets, but may also gradually have instant messaging functions similar to Telegram or WeChat.

This feature is currently in the testing phase and not all users can experience it.

But what is more eye-catching is that Musk claimed that XChat uses Bitcoin-style encryption and is developed in the Rust language, claiming to be a brand-new architecture.

Musk is working on XChat. What exactly is the Bitcoin-style encryption architecture?

Bitcoin is too classic, so classic that many people are familiar with its name and treat it as a leading asset, but they are not very clear about what technology it uses.

What exactly is the Bitcoin-style encryption architecture that Musk mentioned? I flipped through the Bitcoin white paper again and interpreted it from the perspective of an old investor.

XChat beta version features preview

According to feedback from some Twitter users, their X account has been pushed Xchat and marked as a Beta test version. The core function is that private messages will be end-to-end encrypted on all your devices, and no one can read your private messages, including X.

Musk is working on XChat. What exactly is the Bitcoin-style encryption architecture?

Then we can break down this feature based on Musk’s original post and netizens’ feedback.

  • End-to-end encryption: Messages and call contents can only be seen by the two parties communicating, and third parties (including X platform) cannot spy on them.

  • Destroy after reading: You can set the message to be automatically deleted after a certain period of time, such as 10 minutes, to protect privacy more thoroughly.

  • Any file transfer: Supports sending any type of file, including photos, videos, documents, etc., no longer restricted by format or size.

  • Cross-platform audio and video calls: No mobile phone number is required to make calls, and it supports multiple devices such as mobile phones and computers. The call content is also encrypted.

You know what, this is a bit like Telegram.

What does this have to do with Bitcoin?

When it comes to Bitcoin-style encryption, many peoples first reaction may be: Isnt Bitcoin used for transferring money? What does it have to do with encrypted chat?

Don’t be impatient, let’s first review Bitcoin’s encryption technology and then see how XChat may learn from it.

Musk is working on XChat. What exactly is the Bitcoin-style encryption architecture?

In fact, the title of the Bitcoin white paper more than ten years ago has already made it very clear: Peer-to-peer cash payment system. The peer-to-peer here is the P2P that we often hear.

BTC--- Want to achieve peer-to-peer (you and me) transfers without the need for a middleman;

Xchat--- Want to achieve peer-to-peer (you and me) chatting without the need for a middleman.

These are different implementation directions of the same technology.

How does Bitcoin do peer-to-peer?

Let’s put aside the blockchain’s ledger technology for now. In order to achieve peer-to-peer transfers, Bitcoin uses encryption technology, which can be simply described as “lock” and “signature”.

  • Lock: Elliptic Curve Cryptography (ECC): Bitcoin uses something called Elliptic Curve Cryptography (ECC). Simply put, it is like a super secure lock. Everyone has two keys: one is a public key (public, equivalent to a lock), and the other is a private key (only you know, equivalent to a key). For example, if you want to transfer Bitcoin to a friend, your wallet will use your friends public key to lock the transaction, and only your friend can unlock and get the money with his or her private key. No one can peek or tamper with the whole process, and even the Bitcoin network cannot see the transaction details.

  • Signature: Digital signature (ECDSA) In addition to the lock, Bitcoin also uses digital signatures to prove that you are you. When you transfer money, your wallet will use your private key to generate a signature to prove that the transaction was indeed sent by you. Others can verify this signature with your public key, but it cannot be forged.

  • Anti-tampering: Hash algorithm (SHA-256) Bitcoin also uses a hash algorithm called SHA-256, which turns transaction information into a fixed-length fingerprint. If the transaction is changed, even if only one letter is changed, the fingerprint will be completely different and the network will be able to detect it immediately.

Please note that these encryption algorithms and signature algorithms were not invented by Bitcoin, but they are used together in combination.

Musk is working on XChat. What exactly is the Bitcoin-style encryption architecture?

Therefore, combined with the functions of XChat, we can speculate that it may use Bitcoin technology in this way, which is what Musk calls Bitcoin-style encryption:

  • End-to-end encryption: a safe for messages XChats end-to-end encryption may use a variant of ECC (such as the ECDH protocol). When you send a message to a friend, your phone will encrypt the message with your friends public key, and only your friends private key can decrypt it. For example, if you send Ill be there at 7 tonight, the message will become a string of garbled characters that can only be decrypted by your friends device, and the X platform or others cannot see it. Audio and video calls may also use similar methods to protect the content of the call from being eavesdropped.

  • Digital signature: Prove that the message was sent by you XChat may use digital signature technology similar to ECDSA to ensure that the source of the message is credible. For example, if you send a contract document, XChat will sign it with your private key. After receiving it, your friends can verify it with your public key to confirm that the document was sent by you and has not been tampered with.

  • Destroy after reading: encryption + timed destruction The disappearing message function may combine encryption and timed destruction mechanisms. After the message is encrypted, only the recipient can see it, and the server will automatically delete it after a specified time (such as 10 minutes). Even if the device is hacked, the historical messages cannot be found.

  • File transfer: tamper-proof fingerprint When transferring files, XChat may use SHA-256 to generate the hash value (fingerprint) of the file. After the friend receives the file, the system will automatically verify the fingerprint to ensure that the file has not been tampered with in the middle.

As for what development language to use, RUST or something else, the author is not from a technical background so I will not interpret it in detail here.

More than just chatting

The launch of XChat is more than just a chat tool.

Musk has always wanted to turn X into an everything app (super app), similar to the WeChat we often use.

Musk is working on XChat. What exactly is the Bitcoin-style encryption architecture?

Clues can be seen from some of his actions, such as first acquiring Twitter, then borrowing many functions from WeChat, integrating Grok AI, and so on.

With the gradual passage of the US Stablecoin Act and the formation of a crypto-friendly environment, we have reason to expect the emergence of payment-related functions, such as XPay.

WeChats success in China is based on social relationships and strong stickiness, integrating chat, payment, taxi, shopping and other functions. If XChat can integrate payment (XPay), AI assistant (Grok 3), social (X platform community function), and add strong privacy protection, it is entirely possible to become the super WeChat of the West.

Finally, is the term “Bitcoin-style encryption” really that unique? Not necessarily.

Technologies such as elliptic curve cryptography (ECC), digital signature (ECDSA), and hash algorithm (SHA-256) are no longer exclusive to Bitcoin.

Many security applications use similar technologies, such as WhatsApp and Signal’s end-to-end encryption, which also relies on ECC and hashing algorithms; Apple’s iMessage even adopted ECC in the 2010s. Although Bitcoin’s encryption technology is reliable, it is more like an “industry standard” and does not have much originality.

Musks choice of the expression Bitcoin style is more likely due to marketing considerations. As a synonymous with cryptocurrency, Bitcoin comes with its own traffic and trust aura.

But the more pro-crypto statements there are, the happier we are.

In the context of attention tokenization, more features and gameplay from X and Musk are also worth looking forward to.

Original article, author:深潮TechFlow。Reprint/Content Collaboration/For Reporting, Please Contact report@odaily.email;Illegal reprinting must be punished by law.

ODAILY reminds readers to establish correct monetary and investment concepts, rationally view blockchain, and effectively improve risk awareness; We can actively report and report any illegal or criminal clues discovered to relevant departments.

Recommended Reading
Editor’s Picks