Key Advantages
ZeroLayer is engineered to provide robust, user-friendly privacy. Here are the key advantages that set it apart from other on-chain privacy solutions.
Zcash-Style Cryptographic Guarantees
The privacy you get with ZeroLayer is not based on statistical assumptions or the size of an anonymity pool. It is mathematically guaranteed by zero-knowledge proofs (zk-SNARKs), the same battle-tested technology that powers Zcash.
- Confidentiality: The sender, receiver, and amount of every transaction are fully encrypted.
- Integrity: The protocol proves in zero-knowledge that all transactions are valid (e.g., no value is created out of thin air) without revealing any of the underlying data.
Superior to Mixing Protocols
Traditional mixers rely on co-mingling funds in a large pool to create a "crowd" to hide in. This model has inherent limitations that ZeroLayer overcomes:
| Feature | Mixers (e.g., Tornado Cash) | ZeroLayer |
|---|---|---|
| Privacy Source | Statistical Anonymity (relies on pool size) | Cryptographic Anonymity (guaranteed by math) |
| Asset Type | Hides the trail of public tokens | Creates new, inherently private assets (ZRC-20s) |
| User Experience | Deposit, wait, and withdraw. Cannot transact privately. | Shield once, then transfer privately as many times as you want. |
| Composability | Limited. Does not create a new asset class. | High. ZRC-20s can be integrated into other DeFi protocols. |
With ZeroLayer, your privacy is self-contained and does not depend on the actions of other users.
Decentralized and Non-Custodial
Your assets and your keys are always under your control.
- Non-Custodial: The ZeroLayer protocol never takes custody of your funds. The smart contract acts as a trustless verifier, not a custodian.
- Client-Side Encryption: All cryptographic operations, including key generation and proof creation, happen locally in your browser. Your private keys never leave your device.
- Permissionless: Anyone can use ZeroLayer to make their tokens private, and any developer can build on top of the protocol without seeking permission.