Security Model

Principles

  • No logs

  • Cryptographic privacy

Features

  • Ring sigs

  • ZK proofs

  • Encryption

Limitations

  • User error

  • Network analysis risk