History CSV Export

History CSV Export

StatusEntrypoint

Concept

Introduction

Panther Protocol aims to offer both privacy and transparency from the dApp. To this end, the Historical CSV Data Export feature allows users to voluntarily export a comprehensive history of all transactions associated with their zAccount. Notably, these transactions are not linked to the public addresses of the dApp users, enhancing transactional privacy.

Key features

The CSV file provides a full record of the user’s transactions β€” maintaining a transparent and traceable personal record.

Furthermore, this feature supports voluntary disclosure. Users have granular control over the generation and sharing of their transaction history, giving them nuanced control over whether to maintain privacy or provide transparency according to the intended recipient of the data.

How it works

Using their encrypted on-chain data, users can generate audit files from within the dApp:

  1. View Transaction History

Users can view/search their past transaction via the interface within the History tab within the dApp. This action triggers the compilation of their transaction history.

  1. Export

Users can click the export button and download their transaction history as a CSV file.

Use cases

  • Compliance and reporting

For users requiring transaction history for compliance or reporting purposes, this feature provides a detailed and verifiable record without compromising privacy.

  • Personal record keeping

Users seeking to maintain personal records of their digital asset movements can utilize this feature for organized and accessible transaction history.

Note on privacy and security

While the Historical CSV Data Export feature is designed to offer detailed transaction history, user privacy remains a paramount concern. All exported data is handled with strict privacy measures, ensuring that user identities and their association with public blockchain addresses remain confidential. Users are encouraged to safeguard their exported data with the same diligence they apply to their private keys and other sensitive information.

Last updated