Forensic Reveals

Zone Manager led reveals




  • Each transaction results in an encrypted “message to data escrow”

  • The message is secured with an "ephemeral key", i.e. a unique key is created for every transaction

  • Only with the alignment of the stakeholders who hold cryptographic keys can the message be unpacked and the data revealed


The Forensic Data Escrow (FDE) mechanism supports one-off/ad-hoc inquiries. This is in contrast to the data a Zone Manager may extract for ongoing/routine compliance procedures that are part of every transaction — the latter are supported by different mechanisms implemented in the protocol.

The routine Protocols are wip.

The FDE retains an encrypted record containing private data of a particular transaction in a Shielded Pool. This mechanism does not require any spending keys, i.e., it can be used to deanonymize data but not to spend funds.

The Protocol prepares, verifies, and publishes a transaction record for every transaction. Decrypted FDE records provide transaction data such as:

  • Which zAccounts received funds

  • Which Zones the funds originate from and and were spent in

  • Whether the UTXO/s created by the investigated transaction have already been spent

  • Which transaction(s) initially created the queried UTXOs


The FDE Operator’s key must be used to access FDE records. Either the Network FDE Assistant or the Zone FDE Assistant must comply to use this key.

Network FDE assistant

The Network FDE assistant (or the Zone FDE Assistant) role controls the FDE record key. This key is required to decrypt the FDE record; for a transaction in a specified Zone on a specified network and share this key with the FDE Operator.

FDE Operator

FDE Operator adds a layer of control over the Zone FDE Assistant’s key. The FDE Operator must comply and use their key to allow the Network FDE Assistant to decrypt a particular transaction on the designated network for the designated Zone.

The FDE Operator can’t open an FDE record with their Key alone (as they don’t control the FDE record key). Either the Network FDE Assistant or the Zone FDE Assistant should participate in the decryption process (providing the FDE record key).

On the other hand, neither the Network FDE Assistant nor the Zone FDE Assistant can decrypt any FDR without the FDE Operator (as they don't control the FDE Operator’s key).

Last updated