Confidential Layer
  • Confidential Layer
    • Introduction
    • Understanding Confidential Layer
    • Roadmap
  • $CLONE
    • Tokenomics of $CLONE
    • Token Details & Vesting
    • Staking
    • Token Utility
    • Where to get $CLONE?
  • Technology
    • How does bridging work?
    • Confidential Assets in CL
    • Threshold Signature
    • Supported Chains
    • Security
  • Guides
    • How to buy/reserve $CLONE?
    • Claim Guide
    • Staking Guide
    • How to add Bridgeless blockchain?
    • How to use Testnet Bridge?
  • OFFICIAL LINKS
    • Find all links here
Powered by GitBook
On this page
  1. Technology

Security

Security is addressed through several measures:

  • Validation nodes ensure that all transactions are valid and correctly executed by verifying the locking of assets on the original blockchain before issuing tokens on the target blockchain.

  • Consensus mechanisms are used to maintain agreement among the nodes, preventing fake activities and ensuring the integrity of the transactions.

  • Advanced cryptographic techniques, such as encryption and digital signatures, protect transaction data and prevent unauthorized access.

  • Specialized cross-chain protocols facilitate secure communication between different blockchains, ensuring that the transfer process is seamless and manipulation-proof.

Additionally, the system undergoes regular security audits and testing to identify and mitigate potential vulnerabilities.

We are also in the process of getting audits from reputable auditor teams (most importantly Hacken) as well as independent bounty program auditing.

PreviousSupported ChainsNextHow to buy/reserve $CLONE?