Technology Stack

Data Security and Privacy

Data Security and Privacy

Data handling at rest in transit and on chain

Storage

  • Originals encrypted off chain using AES 256 GCM with KMS or HSM key wrapping and rotation

  • Pseudonymized merchant identifiers using HMAC SHA256 with rotating secrets

 

Access control

  • OIDC or OAuth for service identity

  • RBAC and ABAC for least privilege

 

Audit and retention

  • Change and view logs with export and retention settings

  • Optional deletion proofs via hash receipts

 

On chain boundary

Only minimal metadata goes on chain. Sensitive data stays off chain.

 

Project summary

This site shares work in planning and is for information only; products and services may change or not launch, nothing here is an offer or advice, no custody or transfer of funds, approvals and payouts are determined by partners under their own policies and regulations, and availability may vary by jurisdiction.

This site shares work in planning and is for information only; products and services may change or not launch, nothing here is an offer or advice, no custody or transfer of funds, approvals and payouts are determined by partners under their own policies and regulations, and availability may vary by jurisdiction.