Core Security Principles
Salud’s security model is built on four foundational pillars:End-to-End Encryption
All medical data is encrypted before leaving your browser and remains encrypted on the blockchain:- Client-side encryption: Data never reaches the server in plaintext
- Private records: Stored as Aleo private records only you can decrypt
- Zero-knowledge: Even the backend cannot read your medical records
Blockchain-Powered Access Control
Access permissions are enforced cryptographically on-chain:- Access tokens: Cryptographically generated, unpredictable tokens
- Time-limited: Automatic expiration based on block height
- Revocable: Instant revocation before expiration if needed
- Auditable: Full access history visible on-chain
Privacy-First Design
Salud follows privacy-by-design principles:- Minimal data exposure: Only metadata is public, never content
- Selective disclosure: Share specific records, not your entire history
- No backend storage: The server doesn’t store medical data
- Session-based keys: Private keys only in memory during active sessions
HIPAA-Grade Standards
While not a traditional healthcare provider, Salud implements security controls comparable to HIPAA requirements:- Technical safeguards: Encryption, access controls, audit trails
- Administrative controls: User-controlled permissions, time limits
- Physical safeguards: Blockchain immutability, distributed storage
Security Architecture
What’s Protected
Medical Data
Your health records are stored as private records on Aleo. Only you can decrypt and view the contents.
Access Tokens
Cryptographically generated tokens using hash functions prevent prediction or forgery.
Time Controls
Access expiration is enforced at the blockchain level using block height - cannot be bypassed.
Revocation
Instant access revocation updates on-chain state, immediately invalidating access.
Security Features
Private Records on Aleo
Medical records are stored as private records on the Aleo blockchain:Private records are only visible to the owner. The blockchain stores them encrypted, and only you hold the decryption keys.
Access Grant System
When you share a record with a doctor, an AccessGrant is created in a public mapping:Cryptographic Token Generation
Access tokens are generated using the BHP256 hash function:- Unpredictability: Impossible to guess or forge tokens
- Uniqueness: Each grant has a unique token
- Deterministic verification: Same inputs always produce same token
Threat Model & Mitigations
| Threat | Mitigation |
|---|---|
| Unauthorized access | Record ownership enforced by blockchain; only owner can grant access |
| Token prediction | Client-provided random nonces in cryptographic hash |
| Replay attacks | Unique tokens per grant; single-use access grants |
| Stale access | Block height-based expiration enforced on-chain |
| Man-in-the-middle | End-to-end encryption; data encrypted before transmission |
| Backend compromise | Zero-knowledge architecture; backend can’t decrypt records |
| Private key theft | Session-based storage; never persisted to disk |
| Data tampering | Integrity hashes verified; blockchain immutability |
Known Limitations
Security Checklist
Ensure you follow these security practices:Use a secure password manager
Store your private key in a reputable password manager like 1Password or Bitwarden.
Never share your private key
Your private key is like a master password - never share it with anyone, including support.
Use appropriate access durations
Grant the minimum necessary access time - 1 hour for consultations, longer for ongoing care.
Next Steps
Privacy Model
Deep dive into zero-knowledge proofs and the privacy architecture
Best Practices
Security guidelines for patients and healthcare providers