GhostPay Mesh is a cryptographic protocol for offline-first value transfer. Create, send, and settle payments — no connection required.
Billions of people and businesses are cut off from reliable payments every day — at festivals, in transit, during outages, and in developing markets.
GhostPay Mesh uses cryptographic promises to enable value transfer without any network connection.
Generate cryptographic payment promises offline. Each promise is signed, timestamped, and bound to your device.
Send payments via QR code, NFC, or Bluetooth. No servers, no internet — just peer-to-peer value exchange.
When connectivity returns, the protocol auto-reconciles all transactions against the cryptographic ledger.
Every transaction is protected by the same algorithms trusted by intelligence agencies and blockchain networks.
AEAD encryption for payload confidentiality and integrity.
Elliptic curve signatures for tamper-proof authentication.
Keys generated and stored on-device, never transmitted.
Prove commitment validity without revealing transaction data.
From festival crowds to disaster zones, GhostPay Mesh works where traditional payments fail.
Process thousands of payments when cell towers are overloaded.
Pay anywhere — planes, ships, rural areas, developing markets.
Distribute aid and process payments when infrastructure is down.
Never stop processing — even during network outages.
Everything you need to integrate offline payments into your application.
Full-featured HTTP API with comprehensive documentation.
Native SDKs for Flutter and React Native.
Complete cryptographic protocol specification.
Guides, references, and integration examples.
// Create an offline payment promise const promise = await ghostpay.createPromise({ amount: 50.00, currency: 'USD', recipient: 'merchant_abc', offline: true, }); // Transfer via QR code const qr = await promise.toQR(); // Auto-settles when connectivity returns promise.onSettle((receipt) => { console.log(`Settled: ${receipt.id}`); });
A clear path from protocol to open network.
We build trust through openness, auditability, and privacy by design.
Real-time protocol health and uptime monitoring.
Immutable, verifiable transaction history.
Minimal data collection. Maximum privacy.
On track for SOC 2 Type II compliance.
Join the protocol that works when everything else fails.