Security

Umbrella offers enterprise-grade security tooling

ZTAP - Zero Trust Access Protocol

Application built on Umbrella protocol for Onchain Access Controls. Limit visibility to other onchain participants of sensitive data. Give tokenized access built around data policy.

Public blockchains are typically flat, and everyone can see everything. This isn't feasible for businesses that have to protect user data. By implementing a Hierarchy on the chain itself, we can allow roles that protect sensitive information from prying eyes using zero knowledge.

Zero-Knowledge Proofs

Umbrella offers developers advanced zero-knowledge identity and exchange tools to create their applications to be as private as they believe fits their use case. Zero-knowledge rollups can be used to scale applications securely and easily multiply Umbrella's base speeds.

A Fully Data Redundant Chain

One of the principles of data security is ensuring there are several copies of your data. In fact, in some countries, it's a requirement for any consumer application that if an application goes down, users have to have access to their data for several months or even years.

Umbrella keeps hashes of the entire chain's history on other major chains as an insurance policy so that if the network goes down for any reason, users still have access to their history for accounting and reporting purposes.

HDAG

HDAG offers granular access control to users on a public network to decide who can and cannot see their data. This is implemented at the protocol level to protect on-chain history and Relativity Scores.

Enterprises come together and are incentivized to be honest with each other while risking their accountability, reputation, and legal consequences. Simultaneously, they don’t want anyone else to cheat as it negatively impacts them as well; so they agree to watch each other. Each of these enterprises maintains a supernode and is in a legal agreement with the DAO that governs the network, so failure to follow through on commitments has real-world consequences. Supernova nodes act as software & L2 maintainers in the legal structure but behave no differently than the Supernodes. This is the core of the Hierarchical architecture used by our nodes, called HDAG.

HDAG combines two concepts. A DAG is another form of DLT that enables a non-linear data structure that doesn’t suffer from the waterfall bottleneck that traditional blockchains face. Here’s a short article on the pros and cons of traditional blockchains verse DAGs here.

The main problem with DAG implementations so far is that they’re not sufficiently decentralized. Currently, Sui, Aptos, and Umbrella are the only chains with a DAG architecture that is also infinitely decentralizable.

The “H” in HDAG stands for hierarchy and contributes primarily to security, not scalability. Having supernodes undergo a filtered process for onboarding prevents the likelihood of malicious actors being involved in attacking the network. Furthermore being able to create application-level and protocol-level privacy enables enterprise-grade applications to finally be able to consider public blockchains for live use cases.

Last updated