Security Concepts

Security by construction, not by support-team discretion.

PayMoney uses modern cryptography to enforce trade rules in code. Users should understand both the strength of these primitives and the operational responsibilities that come with self-custody.

Cryptographic networkAnimated curves and nodes representing cryptographic proofs and signatures.

TLSN selective disclosure proves payment facts.

FROST threshold signatures remove single-device risk.

Elliptic curves make verification cheap, forgery expensive.

Core building blocks

TLS Notary (TLSN)

Proves what data appeared in an encrypted session while revealing only selected fields. This enables payment verification with minimal data leakage.

FROST Threshold Signatures

Splits signing authority across devices or guardians. Recommended 2-of-3 setups balance compromise resistance with practical recovery.

Smart Account Abstraction

Supports gas sponsorship, batched actions, and policy controls, reducing friction without giving custody to a centralized operator.

Mathematical foundation

Why group theory and elliptic curves matter in practice.

  • Finite groups provide structured operations where hard inversion problems block brute-force shortcuts.
  • Elliptic curve signatures keep verification fast while making forgery computationally impractical.
  • Security depends on parameter choices, implementation quality, and secure key handling by users.

Operational guidance

Security posture users should maintain.

Recommended setup

Use 2-of-3 signer configuration with phone, laptop, and offline backup. Test recovery before storing meaningful value.

Threat model

Protect against device theft, phishing, and backup loss. Cryptography cannot compensate for compromised key material.

Transparency principle

Assume no hidden operator override exists. If rules are not in contract code, they should not be treated as available controls.