Security Model
ShadowPay’s security architecture has three pillars:
1. Key Security (Self-Custody)
Users hold their own keys. ShadowPay cannot move your funds. Infrastructure attacks cannot drain your wallet.
2. ZK Proof Security
Every transaction is validated via zero-knowledge proofs:
sufficient funds
rule compliance
no double-spend
within allowed limits
Without revealing balances, identity, or history.
3. Data Minimization
We do not store sensitive transaction data. We design the system such that there is nothing meaningful to steal.
The goal is not just defense — it’s minimizing what could ever be compromised.
Last updated
