A standard ledger is transparent; anyone can see address balances and transaction paths. The Invisible Ledger uses shielded transactions where the data is transformed into cryptographic commitments. The "correctness" of the ledger is verified by math (ZK-proofs) rather than public inspection.
Frequently Asked Questions
Frequently asked questions pertaining to blockchain and web development.
Navigating On-Chain Privacy and the UTXO Model
The nullifier acts as a unique fingerprint for a spent note. It allows the smart contract to prevent double-spending without ever knowing which specific commitment (note) in the Merkle tree was accessed. It provides a secure way to prove I have funds and have spent them, without revealing my account history.
No. As an L1 application, it runs directly on existing transparent chains (like Ethereum). It creates a "private room" within the public house, where institutional capital can move without surveillance while retaining the security of the underlying network.
In a shielded model, we don't delete data because that would reveal which note was used. Instead, we always add new commitments. This keeps the global state auditable at the root level without leaking the contents of the individual leaves.
Tokenized Gold: Why Your Assets Need a "Digital Passport"
We use a Secure Mint architecture with Chainlink PoR. The smart contract only mints tokens after the Oracle verifies the bar's metadata in the VMS.
1:1 stability = MiCA. Yield-bearing = MiFID II. Neti helps you choose the right technical standard (ERC-20 vs. ERC-3643) for either path.
ERC-20 lacks built-in compliance. ERC-3643 (T-REX) embeds an ONCHAINID layer, validating every transfer against KYC/AML rules in real-time.
Can I get physical gold back?
With our modular infrastructure, we can deploy a functional MVP in 3 to 5 months.