Core Privacy Principles
P2P Protocol is designed with privacy as a fundamental requirement, not an afterthought. The privacy model ensures that users can transact with confidence that their personal information remains protected while still meeting necessary compliance requirements.Privacy Foundation:
- Data minimization: Contracts store only commitments, verdicts, and reputation deltas
- Selective disclosure: ZK-KYC proofs reveal only predicates required for identity verification and compliance tiers
- Retention & Access: Governance-set retention of attestations; no raw PII on-chain
- Linkability: User-facing guidance to avoid unintended linkage across sessions where feasible
Data Minimization
The protocol operates on the principle of storing the absolute minimum data necessary for functionality.What’s Stored On-Chain
Smart Contract Storage:- User names or identities
- Wallet addresses linked to real identities
- Payment account numbers
- Bank details
- KYC documents
- Transaction evidence (except hashes)
What’s Stored Off-Chain
User Device / Wallet
User Device / Wallet
- Private keys
- ZK proof generation parameters
- Complete KYC documents (optional local storage)
- Transaction history details
- Payment addresses
Verifier Systems (ZK-KYC Providers)
Verifier Systems (ZK-KYC Providers)
- Minimal identity data required for verification
- Verification logs (time-limited retention)
- Proof generation parameters
Client Applications (Coins.me, p2p.me)
Client Applications (Coins.me, p2p.me)
- User preferences and settings
- Cached transaction display data
- Analytics (anonymized)
Selective Disclosure
ZK-KYC proofs reveal only predicates required for identity verification and compliance tiers. Bank transaction verification is planned (see Section 4.2).ZK-KYC Disclosure Levels
Tier 1: Basic
What’s Proven:
- User is a unique human (anti-Sybil)
- Over 18 years old
- Not on sanctions lists
- Name, address, date of birth
- Document details
- Country of residence (optional)
Tier 2: Standard
What’s Proven:
- Tier 1 predicates +
- Resident of permitted jurisdiction
- Government ID verification
- Specific country (only region revealed)
- ID numbers
- Full name
Tier 3: Advanced
What’s Proven:
- Tier 2 predicates +
- Income/source of funds category
- Enhanced due diligence completed
- Specific income amounts
- Employer details
- Bank names
Tier 4: Merchant
What’s Proven:
- Tier 3 predicates +
- Business registration (if applicable)
- Liquidity proof
- Most details still minimized
- Only commitments on-chain
Example: Age Verification Circuit
ZK Circuit for “Over 18” Proof:Inputs (Private):
- Date of birth from passport/ID
- Document signature
- Issuing authority
- Current date
- Required age (18)
- Verifier address
- TRUE/FALSE: age >= 18
- Proof commitment hash
Planned: Bank Transaction Verification
Future evidence module will extend selective disclosure to payment proofs:What will be proven:
- A transaction of specific amount occurred
- Transaction timestamp within valid window
- Sender/receiver matches order requirements
- Account numbers
- Bank names
- Other transactions in account
- Account balances
- Personal identifiers
Retention & Access
On-Chain Data Retention
Permanent (by design):- Order commitments (hashes only)
- Reputation deltas
- Settlement outcomes
- Governance decisions
Off-Chain Data Retention
Verifier Systems
Verifier Systems
Retention Policy:
- Verification attempts: 90 days
- Successful verifications: 1 year
- Unsuccessful attempts: 30 days
- Suspicious activity: 2 years (compliance requirement)
- Request deletion after retention period
- Export personal data
- Revoke verification (loses associated reputation)
Dispute Evidence
Dispute Evidence
Retention Policy:
- Active disputes: Until resolution + appeal period
- Resolved disputes: 6 months
- Fraud cases: 2 years
- Only authorized admins/arbitrators
- Encrypted at rest
- Audit log of all access
- Automatic deletion after retention period
Client Applications
Client Applications
Retention Policy:
- User choice (local storage)
- No server-side storage of PII
- Analytics anonymized and aggregated
- Clear cache anytime
- Export history
- Opt out of analytics
Data Access Rights
Linkability
User-facing guidance to avoid unintended linkage across sessions where feasible.Linkability Vectors
Wallet Address Linkability
Wallet Address Linkability
Risk: All orders from same wallet address are linkableMitigation:
- User guidance to use separate wallets for privacy
- Support for wallet rotation
- ZK-proof linking to new wallet while preserving reputation
Transaction Timing
Transaction Timing
Risk: Unique transaction timing patterns may identify usersMitigation:
- Batched order submission (coming)
- Randomized settlement times
- User guidance on timing privacy
Amount Patterns
Amount Patterns
Risk: Distinctive transaction amounts may be identifyingMitigation:
- Round number suggestions
- Privacy-preserving amount ranges
- User education
Cross-Rail Correlation
Cross-Rail Correlation
Risk: Using same payment rail repeatedly creates patternsMitigation:
- Encourage rail diversity
- No requirement to use same rail
- Payment details encrypted per-order
Privacy Best Practices (User Guidance)
Recommended Practices:
- Use separate wallets for different contexts if privacy important
- Vary transaction amounts to avoid patterns
- Don’t reuse the same payment accounts unnecessarily
- Be aware that reputation tracking requires some linkability
- Use fresh addresses for receiving crypto when possible
- Consider timing of transactions if correlation is a concern
Privacy vs. Compliance
The protocol navigates the tension between privacy and compliance through:Programmable Compliance
- Minimal disclosure: Prove only what regulations require
- Tiered verification: Higher compliance for higher limits
- Selective revelation: Reveal to counterparties only when needed
- Jurisdiction-aware: Different rules for different regions
Travel Rule Compatibility (Planned)
For transactions involving regulated entities:This enables compliance where legally required without compromising privacy for peer-to-peer transactions between individuals.
Privacy Guarantees
What We Guarantee
No PII On-Chain
Never will user names, addresses, documents, or raw identity data be stored on public blockchains.
Cryptographic Protection
All proofs use zero-knowledge cryptography. Verification reveals only the predicate, not the data.
User Control
Users decide what to verify, when to disclose, and can export or delete data within legal limits.
No Selling Data
Protocol will never sell user data. Revenue comes from transaction fees, not data monetization.
What We Cannot Guarantee
Privacy Roadmap
Near-Term
- Launch with current ZK-KYC selective disclosure
- Publish privacy best practices guide
- Implement encrypted messaging for order coordination
Medium-Term
- Bank transaction ZK proofs
- Enhanced wallet privacy features
- Anonymous reputation credentials (research)
Long-Term
- Fully anonymous credibility system
- ZK-rollup for order privacy
- Decentralized identity integration (DID)
- Quantum-resistant privacy primitives
Privacy technology evolves rapidly. The protocol commits to adopting privacy-enhancing technologies as they mature while maintaining security and compliance requirements.