Core Security Features
End-to-End Encryption
AES-256 encryption secures all messages.
ECC Key Exchanges
Lightweight, secure session establishment using elliptic curve cryptography.
Public/Private Key Pairs
Keys are never transmitted—only generated and used locally.
Zero-Knowledge Proofs
Validate actions without revealing sensitive data.
Fraud Prevention
Replay Attack Protection
Unique message signatures prevent duplication or tampering.
Device Authentication
Lightweight cryptographic challenges secure relay nodes.
Merkle Tree Structures
Enables efficient, tamper-resistant transaction validation.
Consensus on Reconnect
Local transactions automatically sync globally once internet access returns.