Security Model

ShadowPay’s security architecture has three pillars:

1. Key Security (Self-Custody)

Users hold their own keys. ShadowPay cannot move your funds. Infrastructure attacks cannot drain your wallet.

2. ZK Proof Security

Every transaction is validated via zero-knowledge proofs:

  • sufficient funds

  • rule compliance

  • no double-spend

  • within allowed limits

Without revealing balances, identity, or history.

3. Data Minimization

We do not store sensitive transaction data. We design the system such that there is nothing meaningful to steal.

The goal is not just defense — it’s minimizing what could ever be compromised.

Last updated