ƒxyzƒxyz Docs
The NetworkFoundations

Security & Privacy

Privacy-first architecture, pseudonymity, and cryptographic privacy on Solana Token-2022.

The ƒxyz Network enforces privacy and security through architecture, not policy. Members are identified by DIDs and star names -- never by real names or personal emails. KYC is handled by Bridge.xyz; the network never stores or processes identity documents.

Privacy Architecture

  • Pseudonymity by default: Members are identified by DID (did:privy:...) internally, star names publicly, and wallet addresses on-chain. No real names or personal emails are stored anywhere in the system.
  • KYC without PII storage: Bridge.xyz handles identity verification on their hosted pages. The network receives only approval/rejection status -- no personal data.
  • ElGamal confidential transfers (Planned): Solana Token-2022 includes an ElGamal-based confidential transfer extension. ƒxyz plans to enable this for Florin transfers, allowing amount-private transactions verified on-chain.
  • CryptoGraph ACL system: The Neo4j knowledge graph uses a tiered access control system where node-level _acl, circle-level propertyACL, and tier-privacy fallbacks control who can see what data.
  • Tiered access: Different membership tiers control visibility of financial data, governance details, and network metrics.

Security Measures

  • Arcjet rate limiting: API and application endpoints are protected by Arcjet middleware against abuse and brute-force attacks.
  • Token-2022 program: All tokens (Florin, Joule, HoW) use Solana's Token-2022 program, which supports built-in transfer hooks and access controls.
  • Squads multisig treasury: Treasury operations require multi-signature approval.
  • Privy authentication: Member authentication via Privy with wallet and social login support.

What We Do Not Do

  • Store real names, personal emails, or identity documents
  • Run our own KYC/KYB verification (Bridge.xyz handles this)
  • Expose DIDs in email addresses or public identifiers
  • Use trust assumptions where cryptographic verification is possible

References

On this page