The Singularity Solution
Built initially on Ethereum L1 with plans to deploy on all EVM chains, we position ourselves as modular DeFi infrastructure with the added element of confidentiality all enabled by our zk-circuits.
The diagram above carefully details the high-level overview of how the Singularity protocol operates.
Let's break it down:
To obtain access to Singularity's confidential DeFi infrastructure, all users must either pass KYC or KYB through our third-party data oracle provider, Keyring, or one of our other verified providers.
Following the completion of the KYC & KYB process, to fully take advantage of Singularity users will then be prompted to deposit their assets into our protocol.
After depositing assets into our contract, through integrations with major liquidity pools such as Uniswap and Curve, users can interact as usual. However, the key advantage of using our protocol is the added confidentiality: it obfuscates users' wallet addresses, therefore breaking the direct link between users and their on-chain activities.
Instead of the users' wallet addresses appearing in the on-chain explorer, only Singularity's contract address comes up, essentially acting as a proxy address.
There's a myriad of use cases our users can utilize us for, which we break down in our use case page.
Last updated