DOCS DOCS DOCS DOCS DOCS DOCS DOCS DOCS DOCS
Technical Attestations v1.0

Technical Documentation

Understanding the architecture behind Kimiko's privacy analysis and the Inco Shield attestation system.

1. Analysis Engine: Heuristics

Kimiko utilizes a multi-layered heuristic engine called "Seishin" to profile wallet behavior without compromising identity.

  • Correlation Attack Detection: Analyzing timestamp patterns to identify recurring links between disparate addresses.
  • CEX Behavioral Fingerprinting: Identifying deposit/withdraw patterns associated with major exchanges like Binance and Coinbase.
  • Protocol Leakage: Identifying "naked" interactions with DeFi protocols that expose net worth and risk profile.

2. Selective Visibility Architecture

Our core philosophy leverages Confidential Computing (TEE) and FHE (Fully Homomorphic Encryption) via Inco Lightning.

Trustless Scoring

Scores are generated on the Solana client and encrypted before being sent to the Inco network for confidential storage.

Privacy Proofs

Encrypted reputation scores can be verified by 3rd party dApps using Inco's view-key system without revealing the wallet's contents.

3. API Reference

Integrate Kimiko's privacy engine into your own dApp.

// POST /api/analyze
{
  "wallet": "Solana_Address_Here",
  "options": {
    "depth": 50,
    "includeIdentity": true
  }
}