Security Model
The security of Gone.WTF is built on a foundation of non-custodial principles, audited code, and decentralized verification.
Core Principles
Non-Custodial: We never have access to or control over your funds. Your assets are secured by the on-chain Solana program, and only your Secret Note can authorize a withdrawal. We cannot freeze, move, or access your funds under any circumstances.
Audited & Open-Source: The underlying technology from Light Protocol is open-source and has been audited by independent, third-party security firms. Audits verify that the code functions as intended and is free from critical vulnerabilities.
Client-Side Proof Generation: All cryptographic operations, including the generation of your ZK-proof, happen locally in your browser. Your Secret Note is never sent over the internet or exposed to our servers. This ensures your key remains secret.
Trustless Relayer: The relayer's role is simply to submit your already-completed proof and transaction data to the blockchain and pay the gas fee. The relayer has no ability to alter the transaction (e.g., change the recipient address) or steal your funds. If the relayer tries to tamper with the data, the on-chain program will reject the transaction as the proof would be invalid.
Your security is in your hands. The integrity of the system is guaranteed by mathematics and audited code, not by trusting us.
Last updated
Was this helpful?