TLS Notary (TLSN)
Proves what data appeared in an encrypted session while revealing only selected fields. This enables payment verification with minimal data leakage.
PayMoney Trustless P2P Settlement Read ProtocolSecurity Concepts
PayMoney uses modern cryptography to enforce trade rules in code. Users should understand both the strength of these primitives and the operational responsibilities that come with self-custody.
TLSN selective disclosure proves payment facts.
FROST threshold signatures remove single-device risk.
Elliptic curves make verification cheap, forgery expensive.
Core building blocks
Proves what data appeared in an encrypted session while revealing only selected fields. This enables payment verification with minimal data leakage.
Splits signing authority across devices or guardians. Recommended 2-of-3 setups balance compromise resistance with practical recovery.
Supports gas sponsorship, batched actions, and policy controls, reducing friction without giving custody to a centralized operator.
Mathematical foundation
Operational guidance
Use 2-of-3 signer configuration with phone, laptop, and offline backup. Test recovery before storing meaningful value.
Protect against device theft, phishing, and backup loss. Cryptography cannot compensate for compromised key material.
Assume no hidden operator override exists. If rules are not in contract code, they should not be treated as available controls.