Privacy without accountability is hard to deploy in regulated contexts. The protocol bakes in selective disclosure to a designated auditing entity: only the user under a lawful request is traceable; everyone else remains private.Documentation Index
Fetch the complete documentation index at: https://docs.starknet.io/llms.txt
Use this file to discover all available pages before exploring further.
Registration
Users encrypt their private viewing key to the auditor’s public key and store it on-chain. The auditor can decrypt only subjects of a lawful request.What the auditor can do
With a user’s viewing key, the auditor can:- Scan incoming channels (who sent to this user).
- Scan outgoing channels (where this user sent).
- Decrypt note amounts along those graphs and follow nullifiers / withdrawals to trace funds.
On-chain transparency hooks
The proof enforces emission of events useful for tracing, for example:- Registration — encrypted viewing key (+ event).
- Deposit — depositor address in clear.
- Withdraw — encryption of user address to auditor.
- UseNote — nullifier published.