Logo

/

Command Palette

Search for a command to run...

Veil

Veil

No description available

Overall Score
6.5
Live When
05/2025
IPC
2
Coingecko ID
veil-token
Defillama Slug
p:veil-cash

Category

Subcategory

Total Value Shielded

$25,195.71 (0.32%)

02/05/2025 - 11/08/2025

Total FDV

$

Privacy Analysis

Veil - Wallet Pool

Total Score: 7

Identity Leakage (Who)

Stage: Cryptographic Unlinkability
2
Definition
The protocol employs strong cryptographic techniques to ensure that even actions performed by the same user, including sequential steps in a stateful process, are unlinkable to each other from an external observer's perspective.
Characteristics
An attacker cannot correlate different actions to the same originating user.

Action Leakage (What)

Stage: Obfuscated Action Parameters
1
Definition
An attacker can discern the general _type_ of action being performed, but critical parameters are either hidden, aggregated, or sufficiently ambiguous to prevent precise inference.
Characteristics
The specific values within an action are obscured.
Actions may be batched or aggregated, revealing a total but not individual contributions.

De-anonymization Trust Assumption

Stage: Trustless / Self-Sovereign
2
Definition
The protocol is architected such that no entity, or even the complete collusion of all protocol operators and infrastructure providers, can de-anonymize users. The information required for de-anonymization is secured exclusively by the user and is never shared.
Characteristics
All sensitive user data is either encrypted client-side with keys exclusively controlled by the user, or never leaves the user’s local environment at all.

Protocol Survivability

Stage: Moderately Robust
1
Definition
The protocol is architected on distributed infrastructure but may have certain components that are less resilient. However, these weak points are designed for easy recovery or replacement by the community.
Characteristics
The protocol's codebase **must be open-source**.
While some default infrastructure (e.g., a primary RPC endpoint or front-end) might be centralized, any sufficiently skilled user can bypass the failure by running their own node or interacting directly with the on-chain contracts.

Underlying Technology Maturity

Stage: Battle-Tested
1
Definition
The underlying technology has been rolled out at a significant scale and has a multi-year track record of operating in production with substantial value at stake. It has withstood public scrutiny and attack attempts.
Characteristics
Groth16 (PLONK, STARK, and its variants are migrating towards this level as they accumulate more production time)
Production-grade TEE

Privacy Analysis

Veil - Fixed Pool

Total Score: 6

Identity Leakage (Who)

Stage: Cryptographic Unlinkability
2
Definition
The protocol employs strong cryptographic techniques to ensure that even actions performed by the same user, including sequential steps in a stateful process, are unlinkable to each other from an external observer's perspective.
Characteristics
An attacker cannot correlate different actions to the same originating user.

Action Leakage (What)

Stage: Transparent Action and Parameters
0
Definition
An attacker can see the precise type of action performed and all of its detailed parameters (e.g., asset types, amounts, destinations), even if the 'who' is obfuscated. The public visibility of the action's _result_ (that maybe due to protocol encrypted state or other reasons) is irrelevant to this criterion.
Characteristics
Public data reveals the specific function called and its arguments.

De-anonymization Trust Assumption

Stage: Trustless / Self-Sovereign
2
Definition
The protocol is architected such that no entity, or even the complete collusion of all protocol operators and infrastructure providers, can de-anonymize users. The information required for de-anonymization is secured exclusively by the user and is never shared.
Characteristics
All sensitive user data is either encrypted client-side with keys exclusively controlled by the user, or never leaves the user’s local environment at all.

Protocol Survivability

Stage: Moderately Robust
1
Definition
The protocol is architected on distributed infrastructure but may have certain components that are less resilient. However, these weak points are designed for easy recovery or replacement by the community.
Characteristics
The protocol's codebase **must be open-source**.
While some default infrastructure (e.g., a primary RPC endpoint or front-end) might be centralized, any sufficiently skilled user can bypass the failure by running their own node or interacting directly with the on-chain contracts.

Underlying Technology Maturity

Stage: Battle-Tested
1
Definition
The underlying technology has been rolled out at a significant scale and has a multi-year track record of operating in production with substantial value at stake. It has withstood public scrutiny and attack attempts.
Characteristics
Groth16 (PLONK, STARK, and its variants are migrating towards this level as they accumulate more production time)
Production-grade TEE