Skip to content

Conversation

@namnc
Copy link
Collaborator

@namnc namnc commented Oct 14, 2025

A technical slicing of implementing institutional privacy requirements

Copy link
Collaborator

@oskarth oskarth left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Third comment: for notes re tech, patterns etc it'd be great to link it to existing work, where exists

@@ -0,0 +1,122 @@
---
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we make it more specific than "general approach"? It doesn't seem very concrete :D

If it is more of a research notes, maybe we should put it as research notes?

status: draft WIP
---

# Investor Onboarding
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At a high level, it seems like this document splits into

  • Investor Onboarding
  • Asset Issuance
  • Order Discover And Matching
  • Regulator onboarding
  • Private Data Oracles

Perhaps we can split that up into those four areas?

E.g. how to approach <this ~problem>

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can make this like an index to different approaches/patterns?
can also split into "how to approach <this ~problem>" for easier navigation as well

@oskarth oskarth requested review from Meyanis95 and mojalil October 14, 2025 05:04
- manually through the offchain component of the bank, where the investor can do traditional KYC/AML and indicate the EOA for the bank to add to a list of whitelisted EOA via sending a transaction to a smart contract, this can be pretty trivial technological-wise and there is no privacy leakage beyond the fact that the onchain ID is for the specified Bank that whitelist the EOA;
- automatically through an onchain smart contract, where the investor can send an EOA along with a proof of KYC/AML compliance, and upon successful verification, the EOA will be added to the whitelist, such a proof needs to be privacy-preserving, i.e. the proof is unlinkable to the wrapped ID, aka a zkID presentation to the smart contract.

To preserve the anonymity of the EOA, we can leverage Stealth Address, i.e. instead of whitelisting the EOA, we can whitelist the Stealth Address, this allows the sender to derive a receiver address from this Stealth Address.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think that's a good point, users should have the option to use multiple addresses by default, stealth address is an option; This could also be achieved by signatures + ZKPs;

- PKI for Banks, can be done similarly to ENS
- Per Bank, a PKI of its onchain assets (also ENS for its onchain assets but under Bank?)
- To issue an onchain asset, it can:
- create an ERC directly;
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe we can specify here for clarity ERC-{20, 721, 1155} for example

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants