Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Trustless

An paradigm for operation that relies on cryptographic proofs to avoid depdendence of trust between parties. This concept is deeply related to the zero trust design philosophy.

In trustless systems, data and operations are impotent until validated through the creation of a proof. The proof is created when validators correlate the origin, content, and timing of any piece of data and hash the result. This hash logically binds together this data and its context using robust mathematics. As a result, any ambiguity about the nature of the data is eliminated, removing any opportunity to mislead its users.

More Information Coming Soon