How Protocol Works
A deep dive into our privacy-preserving architecture and Zero-Knowledge proofs.
Privacy by Design Flow
Our architecture ensures your sensitive medical data never leaves your local device.
1
Link Secure Identity
Users connect their wallet. Sensitive health data is retrieved directly from the authorized source and stored locally on the device. We never see or store this data.
2
Generate ZK Proof
The device uses a Circom circuit to generate a cryptographic Zero-Knowledge Proof locally. This mathematical proof asserts validity without revealing any underlying data.
3
Trustless Verification
Verifiers check the proof on-chain (Polygon Amoy). The result is instant and cryptographically certain. No manual human checks required.
