Privacy policy
Data minimization

Resolution without
exposure.

We analyze public ledgers to resolve intent, not to hoard personal identity. Our doctrine is built on the principle of analytical necessity.

Controls
  • Heuristic isolationActive
  • Non-persistent identifiersEnforced
  • Legal trigger rulesv2.1
  • EncryptionAES-256-GCM
Safeguards

The Core Doctrine

ChainÆther's privacy model is predicated on the Structural Privacy paradigm. In the context of public blockchains, privacy is often conflated with anonymity. We recognize that while transaction data is immutable and public, the context surrounding that data is a matter of strategic security.

Principle TENET_01

Behavioral Over Identity

We do not ingest, store, or resolve off-chain Personally Identifiable Information (PII) such as legal names, physical addresses, or social security numbers into our global resolution graph. Instead, we map "Entities": behavioral clusters that represent a single acting force on the ledger. This allows investigators to track funds and assess risk without exposing individuals to unnecessary surveillance.

Principle TENET_02

Ephemeral Resolution Environment

When an analyst performs a deep trace, the correlation data is processed within a Volatile Memory Cluster (VMC). These clusters are non-persistent; once the investigative session is terminated, the specific correlation logic used to resolve that case is purged from our active compute layer, ensuring no long-term "shadow profiles" are generated.

Principle TENET_03

Deterministic Attribution Heuristics

Attribution is a liability. ChainÆther employs a mandatory Dual-Verifier Heuristic. For an entity to be labeled (for example, Exchange X or Lazarus Group Segment), it must pass through two independent algorithmic filters: one based on liquidity flow patterns and another on temporal interaction signatures. If the certainty drops below 98.5%, the label is suppressed in the public UI.

Technical notes

ZERO-KNOWLEDGE TRACING

ChainÆther is developing ZK-Tracing modules that allow users to prove a wallet is not associated with a high-risk cluster (sanctions, theft) without revealing the wallet's transaction history to the system.

VPC ISOLATION

Enterprise instances are deployed within dedicated Virtual Private Clouds (VPCs). This ensures that an organization's internal Watchlists and private annotations never touch the global ChainÆther index.

Operational Obligations

We align our privacy operations with the Privacy by Design framework (ISO 31700-1). This means that every feature, from our Visual Graph to our API Export, is evaluated for its impact on data minimization before a single line of code is committed.

ChainÆther can only provide structural on-chain analysis in response to a regulatory request. Because we do not store off-chain PII, we are technologically incapable of resolving pseudonyms to legal identities unless that data was provided by the user inside their private environment.