Security
Possible attacks and their mitigations are discussed in this section.
📄️ Attacks and mitigations
This section lists possible attacks and how they are mitigated.
📄️ Secure Data Handling
The Kalypso protocol uses a combination of symmetric and asymmetric encryption to protect the integrity and confidentiality of private inputs. This prevents vulnerabilities like the replay attack mentioned in the previous section.
🗃️ Staking and slashing
2 items