Duce Security and Privacy
Threat Model
The Duce protocol is designed to address multiple attack vectors, including:
Miner Extractable Value (MEV): Mitigated by rollup batching and encrypted transaction processing.
Side-Channel Attacks on FHE: Addressed through careful parameter selection and secure hardware integration.
On-Chain Vulnerabilities: Such as reentrancy or integer overflow, mitigated via formal verification tools.
Robust Encryption Standards
The platform utilizes established FHE libraries and follows rigorous cryptographic best practices to secure all operations.
Privacy-Preserving Auditability
Using zk-SNARKs and related techniques, Duce ensures that:
Investment computations are verifiable.
Regulatory compliance can be achieved without compromising investor privacy.
Last updated