🛠️How Thorn achieves confidentiality

At the heart of Thorn lies a robust confidentiality framework, empowered by the Sapphire Paratime's confidential runtime. Leveraging cutting-edge encryption techniques, Thorn ensures the utmost privacy and security of user data, safeguarding against unauthorized access and data breaches.

The Sapphire confidential runtime encrypts both contract storage keys and values, rendering all data managed by Thorn impervious to prying eyes. Access to encrypted data is strictly controlled through selectively disclosed view functions, which offer varying degrees of accessibility, from fully open to authenticated access.

Moreover, Thorn reinforces confidentiality by encrypting transaction calldata within the Sapphire Paratime, preventing any unauthorized party from deciphering sensitive information such as lender identities in transactions. This dual-layered approach, combining at-rest confidentiality with encrypted transaction data, guarantees the anonymity of individual swappers and fortifies Thorn' commitment to user privacy.

Last updated