Introducing Silent Protocol

BM84...Wm3b
4 Jan 2024
85

What is the Silent Protocol? 🤫

Silent Protocol is a privacy wrapper for the Web3 ecosystem that — through an abstraction known as EZEE (Economical Zero-knowledge Execution Environment) — allows end users to have anonymous and pseudo-confidential interactions with existing, natively-deployed EVM smart contracts.With Silent protocol you can interact with Uniswap, Yearn, OlympusDAO, Ribbon, or any other protocol without revealing your transaction details, and retain complete anonymity.

How does Silent Protocol solve web3 privacy problems?

Silent Protocol has developed a zkSNARK-based scheme that allows for anonymous and confidential transactions (via multidimensional non-opt-in construction on the L1) and enables them on any existing DeFi applications without having to pool transactions. With Silent, users don’t need new wallets or additional tooling to take advantage of private DeFi on protocols they already use daily. Using the EZEE framework through 0dapps, Silent Protocol will allow users to perform complex DeFi operations at 1:1 synchronicity with the application contract and grant them complete anonymity and pseudo-confidentiality.

What is EZEE framework and what is the difference from other privacy solutions?

In general there are two types of privacy: functional and data privacy. Functional privacy hides what functions a user initiates and the data related to it while Data privacy on the other hand hides the input and the output of a particular transaction without hiding the function itself. Both these types of privacy are mainly enabled by three types of systems, namely monostatic, multistatic or subsocket systems. Where Monostatic and SubSocket systems enable data privacy, multistatic systems on the other hand enable functional privacy.
In all three of these systems one thing that is seen in common is the condition of “state denial”. State denial basically restricts inter-functional calls across a privacy system whose global state isn’t constant. This makes existing privacy frameworks by design non-composable or doesn’t allow one private application to share its own state with another application in general. It does not allow for the creation of an ecosystem of privacy preserving applications that can share their state and be interoperable.
EZEE(Economical Zero Knowledge Execution Environment) is a patent-pending framework for programmable privacy that addresses the limitations of existing protocols by allowing users to update smart contracts while preserving privacy. Unlike other protocols, EZEE divides the system state into constant and expandable states and segregates users' encrypted account state into multiple secondary account states.This segregation enables target execution silos that operate within the execution layer and interact with end contracts while retaining access to the global shared state. EZEE achieves this by using EZEE Signals, which create application-dependent anonymous asset transfer channels. These channels allow for the aggregation of spatial states stored in different execution silos back into the encryption layer, effectively providing fluid data privacy.

Ezee framework-A framework that does not suffer from the condition of state denial.
EZEE is divided into two parts: an encryption layer and an execution layer. Users are able to obtain data privacy from the encryption layer and gain pseudo-functional privacy from the execution layer. Users can interact with smart contracts through the 0dapp that utilizes ezee signal to create programmable access channels to interact with a smart contract, as they do now but without dealing with the problem of state denial and without revealing who they are.





What are EZEE Signals?
EZEE Signals are signer ambiguous anonymous message passing protocol between two endpoints based on the many out of many proofs and Application identifiers. Through EZEE signals, a user can connect to any target applications from their encryption layer and execute privacy-preserving function calls.

Through EZEE and EZEE Signals, Silent Protocol can provide users the ability to store confidential(encrypted) data and post anonymous calls to target smart contracts that don’t rely on encrypted inputs or any zk proofs.



What are 0dapps?

0dapps (“Zero-knowledge Decentralized Applications”) are client facing applications integrated with a snark powered encryption layer and are powered by EZEE. 0dapp enables users to interact with already existing smart contracts in a privacy preserving manner.0dapps promises to make user data private but at the same time maintains the properties of data immutability and public verifiability alive.
In Silent Protocol, 0dapps are deployed to encapsulate end applications that constitute the execution layer of the system. Users can operate from the Silent’s Encryption layer, where they can segregate and break down the state of their primary account to create secondary accounts based on the 0dapp. Silent protocol, through its 0dapps, can provide users with metadata and network-level privacy while interacting with target applications. For the first time, through these 0dapps, users can interface with the target application without creating zk proofs while retaining privacy, thereby creating an economical zero knowledge execution environment for users to execute smart contract calls anonymously. Silent Protocol allows users to operate n 0dapps running concurrently with one another and lets users aggregate their state back into Silent Protocol’s encryption layer through EZEE signals.


What is the Silent Compliance VM ?

Silent Compliance VM (SCV) is a virtual machine (VM) that is designed to provide a secure and compliant environment for organizations to run their applications and store their data. It is a type of virtualization technology that allows organizations to create and manage virtual machines (VMs) on a single physical host.

The main features of SCV include:
1. Security: SCV provides a secure environment for applications and data by using encryption, access controls, and other security measures to protect against unauthorized access and data breaches.
2. Compliance: SCV helps organizations meet compliance requirements by providing a tamper-proof and auditable environment for applications and data.
3. Isolation: SCV provides isolation between VMs, which helps to prevent the spread of malware and other security threats.
4. Scalability: SCV allows organizations to scale their VMs up or down as needed, which helps to improve resource utilization and reduce costs.
5. Flexibility: SCV supports a wide range of operating systems and applications, which makes it easy for organizations to migrate to new technologies and platforms.

Overall, SCV provides a secure, compliant, and flexible environment for organizations to run their applications and store their data. It is a valuable tool for organizations looking to improve their IT security and compliance posture, while also reducing costs and improving resource utilization.


Resources

Slient Protocol
Medium
Twitter
YouTube
SuDo Research Article




BULB: The Future of Social Media in Web3

Learn more

Enjoy this blog? Subscribe to KingsHarald

3 Comments