DOCS DOCS DOCS DOCS DOCS DOCS DOCS DOCS DOCS
Technical Attestations v1.0
Technical Documentation
Understanding the architecture behind Kimiko's privacy analysis and the Inco Shield attestation system.
1. Analysis Engine: Heuristics
Kimiko utilizes a multi-layered heuristic engine called "Seishin" to profile wallet behavior without compromising identity.
- Correlation Attack Detection: Analyzing timestamp patterns to identify recurring links between disparate addresses.
- CEX Behavioral Fingerprinting: Identifying deposit/withdraw patterns associated with major exchanges like Binance and Coinbase.
- Protocol Leakage: Identifying "naked" interactions with DeFi protocols that expose net worth and risk profile.
2. Selective Visibility Architecture
Our core philosophy leverages Confidential Computing (TEE) and FHE (Fully Homomorphic Encryption) via Inco Lightning.
Trustless Scoring
Scores are generated on the Solana client and encrypted before being sent to the Inco network for confidential storage.
Privacy Proofs
Encrypted reputation scores can be verified by 3rd party dApps using Inco's view-key system without revealing the wallet's contents.
3. API Reference
Integrate Kimiko's privacy engine into your own dApp.
// POST /api/analyze
{
"wallet": "Solana_Address_Here",
"options": {
"depth": 50,
"includeIdentity": true
}
}