Identity Authentication
zCloak.Money's security design is built on the "keyless" philosophy. Users complete identity binding and login via Passkey, with the authentication process handled by hardware security modules and browsers, exposing no private keys. Through binding with user IDs, every Passkey user gains an independent on-chain identity, enabling secure reuse across multiple wallets.The permission system adopts a strict multi-level model, from Root administrators to organization-level approvers, with every operation constrained by the principle of least privilege. System logs record all call hashes and timestamps, preventing replay attacks and malicious access. All signatures are generated on-chain via threshold algorithms, eliminating single points of failure and requiring no trust in third-party nodes. This architecture makes the entire multi-sig system not only securely verifiable but also sustainably operational, independent of external security assumptions.

Last updated
