G6 Networks
  • 👋Welcome to G6 Networks!
  • About us
    • 🧩Challenge & Solution
    • 🌐Public Chain (Retail) MAIN NET LAUNCH IN April 2025.
      • 🧠Concept
      • 🔑Early features
      • 🎯Incentive Layer for Engagement
    • 🔓Private Chain (Enterprise)
      • 🛠️How G6 Networks works
      • 💡Value Proposition
      • 🛣️How to Implement (Roadmap)
      • 💻Services
      • 📃Use Cases
        • Digital Identification and DID Systems
        • Governmental Services
        • Anti-Fraud Measures (Path Tracing)
        • DePIN Systems
        • Real-World Assets (RWAs)
        • Other Fields
    • ⚙️Overall Technology Stack
      • Device Structure
      • Components of an entry level G6 physical device
      • Substrate Framework
      • Polkadot Ecosystem Integration
      • Enhanced Proof of Authority (ePoA)
      • Legal Teleport
      • Zero Knowledge Privacy and Reverse Tracking
      • Private Blockchain Data Storage Solution
      • G6 Operating System
    • 🎓Education
  • Tokenomics
    • 🪙Tokenomics
      • Regulatory Compliance Overview
      • GSX Token: Core Utility and Ecosystem Functions
      • Tokenomics Overview
      • Distribution of Tokens
      • Vesting and Release
        • Fair Launch
        • KYC and AML Compliance
        • Team Tokens
        • Operational Reserves
      • Disclaimer
      • Understanding the Risks in Token Launches
      • Terms and Conditions for Participation in the G6 Networks Token Fair Launch
      • Privacy Policy for the G6 Networks Fair Launch
      • Eco-Friendly Blockchain Solutions and Carbon Footprint Analysis
  • Roadmap
    • 🛣️Project Roadmap 2024
    • 💻Development Roadmap 2024
      • Milestone I - Q2 2024.
      • Milestone II - Q2/Q3 2024.
      • Milestone III - Q2/Q3 2024.
      • Milestone IV - Q4 2024.
      • Milestone V - Q4 2024 - Q1 2025.
      • Milestone VI - Q4 2024.
    • 🛣️Project Roadmap 2025
  • Research & Market analysys
    • 🔍Research
      • Comparison with similar projects
      • Related Project Differences
    • 🔬Market analysis
      • Target audience
      • Importance of G6 Networks
      • Limitations
  • Team/Partners
    • 🏆Meet the Team!
      • Founders
      • Development
      • Project Management
      • Legal
      • Media
      • Advisors
  • References
    • 🔗Contact/Socials
    • 📚Previous Works and Reference
Powered by GitBook
On this page
  1. About us
  2. Overall Technology Stack

Zero Knowledge Privacy and Reverse Tracking

G6 Networks integrates Zero-Knowledge (ZK-SNARKs) security protocols to enhance data privacy and confidentiality. ZK security ensures that sensitive information is protected while still allowing for efficient and verifiable transactions cross-chain.

ZK and EPoA will work together, assigning unique identities to each private chain for signing purposes. Currently, private chains can generate signatures and answer queries. Information is only disclosed upon inquiry by a previously assigned address.

Path Tracing Feature: EPoA combined with ZK opens up the capability of tracking transactions by external parties that are related to the funds sent from one chain to another. In financial institutions it is a well-known problem that once the money is out of the hands of the sender, there is no way to track it anymore, opening up the possibility for corruption and fraud.

Path Tracing Example Private Chain A legally agrees with Chain B to allow tracking for a future transaction to be paid by Private Chain A. After the agreement Chain A pays this large sum to Private Chain B. Chain A or its deputy (eg. G6 Main Chain) periodically requests the relevant hashes and track ID’s from Chain B which needs to return the relevant data and is also required to make relevant hashes public. As long as the transactions seem legitimate or not other external suspicion comes up, the process stays in the logging state. In the other case, Private Chain B will be legally required to uncover further parts of the blockchain to legal entities. Very simply saying, if the reported hashes and data do not match or Private Chain B does not want to uncover the requested parts, that is a clear indication of illegal activity.

PreviousLegal TeleportNextPrivate Blockchain Data Storage Solution

Last updated 1 year ago

⚙️