Security Model
Principles
No logs
Cryptographic privacy
Features
Ring sigs
ZK proofs
Encryption
Limitations
User error
Network analysis risk
No logs
Cryptographic privacy
Ring sigs
ZK proofs
Encryption
User error
Network analysis risk