🛠️How Thorn achieves confidentiality
At the heart of Thorn lies a robust confidentiality framework, empowered by Sapphire Paratime's confidential runtime. Leveraging cutting-edge encryption techniques, Thorn ensures the utmost privacy and security of user data, safeguarding against unauthorized access and data breaches.
Contract Storage Encryption: Sapphire encrypts both contract storage keys and values, rendering all data managed by Thorn impervious to prying eyes.
Selective View Functions: By controlling access through selectively disclosed view functions, Thorn allows different access levels — from fully open to authenticated access.
Transaction Calldata Encryption: Thorn takes an extra step by encrypting transaction calldata within the Sapphire Paratime. This prevents unauthorized parties from deciphering sensitive details such as lender identities during transactions.
This dual-layered approach, combining at-rest confidentiality with encrypted transaction data, guarantees the anonymity of individual swappers and fortifies Thorn's commitment to user privacy.
The document outlines the technical intricacies employed by Thorn to ensure heightened confidentiality.
🎥Maximized confidentialityLast updated