šŸ› ļøHow Thorn protects your privacy

At the heart of Thorn lies a robust confidentiality framework, empowered by Sapphire Paratime's confidential runtime. Leveraging cutting-edge encryption techniques, Thorn ensures the utmost privacy and security of user data, safeguarding against unauthorized access and data breaches.

  • Contract Storage Encryption: Sapphire encrypts both contract storage keys and values, rendering all data managed by Thorn impervious to prying eyes.

  • Selective View Functions: By controlling access through selectively disclosed view functions, Thorn allows different access levels — from fully open to authenticated access.

  • Transaction Calldata Encryption: Thorn takes an extra step by encrypting transaction calldata within the Sapphire Paratime. This prevents unauthorized parties from deciphering sensitive details such as lender identities during transactions.

This dual-layered approach, combining at-rest confidentiality with encrypted transaction data, guarantees the anonymity of individual swappers and fortifies Thorn's commitment to user privacy.

To maximize confidentiality within our platform, Thorn has integrated a range of technical intricacies designed to ensure your security. The document below provides detailed information regarding our privacy architecture!

šŸŽ„The Mechanisms Behind Thorn’s Confidentiality

Last updated