š ļøHow Thorn protects your privacy
At the heart of Thorn lies a robust confidentiality framework, empowered by Sapphire Paratime's confidential runtime. Leveraging cutting-edge encryption techniques, Thorn ensures the utmost privacy and security of user data, safeguarding against unauthorized access and data breaches.
Contract Storage Encryption: Sapphire encrypts both contract storage keys and values, rendering all data managed by Thorn impervious to prying eyes.
Selective View Functions: By controlling access through selectively disclosed view functions, Thorn allows different access levels ā from fully open to authenticated access.
Transaction Calldata Encryption: Thorn takes an extra step by encrypting transaction calldata within the Sapphire Paratime. This prevents unauthorized parties from deciphering sensitive details such as lender identities during transactions.
This dual-layered approach, combining at-rest confidentiality with encrypted transaction data, guarantees the anonymity of individual swappers and fortifies Thorn's commitment to user privacy.
To maximize confidentiality within our platform, Thorn has integrated a range of technical intricacies designed to ensure your security. The document below provides detailed information regarding our privacy architecture!
š„The Mechanisms Behind Thornās ConfidentialityLast updated