Logo

/

Command Palette

Search for a command to run...

Clr.fund

Clr.fund

No description available

Overall Score
6
IPC
1

Category

Subcategory

Privacy Analysis

Clr.fund

Total Score: 6

Identity Leakage (Who)

Stage: Cryptographic Unlinkability
2
Definition
The protocol employs strong cryptographic techniques to ensure that even actions performed by the same user, including sequential steps in a stateful process, are unlinkable to each other from an external observer's perspective.
Characteristics
An attacker cannot correlate different actions to the same originating user.

Action Leakage (What)

Stage: Obfuscated Action Parameters
1
Definition
An attacker can discern the general _type_ of action being performed, but critical parameters are either hidden, aggregated, or sufficiently ambiguous to prevent precise inference.
Characteristics
The specific values within an action are obscured.
Actions may be batched or aggregated, revealing a total but not individual contributions.

De-anonymization Trust Assumption

Stage: Centralized Trust / Fails 'Government Test'
0
Definition
The ability to de-anonymize users or actions rests with a single entity or a small, non-independent group of entities. These entities can be legally compelled or technically compromised to reveal user data.
Characteristics
A single server, operator, or administrator holds decryption keys or logs linking users to actions.
Collusion of a very small number of parties is sufficient to break privacy.

Protocol Survivability

Stage: Highly Robust
2
Definition
The protocol is exceptionally difficult to disable. Its operational dependency is minimal and relies only on its highly robust base-layer infrastructure.
Characteristics
The protocol's core logic is fully autonomous and encoded in on-chain smart contracts.
Any user can continue to use the protocol with basic, widely available infrastructure.
The protocol's survivability is tied directly to the survivability of its underlying blockchain (e.g., 'as long as Ethereum is alive, the protocol is alive').

Underlying Technology Maturity

Stage: Battle-Tested
1
Definition
The underlying technology has been rolled out at a significant scale and has a multi-year track record of operating in production with substantial value at stake. It has withstood public scrutiny and attack attempts.
Characteristics
Groth16 (PLONK, STARK, and its variants are migrating towards this level as they accumulate more production time)
Production-grade TEE