History CSV Export

In our commitment to offering both privacy and transparency within our decentralized application, we introduce the Historical CSV Data Export feature. This functionality allows users to voluntarily export a comprehensive history of all transactions associated with their zAccount. Notably, these transactions are not linked to the public addresses of the dApp users, ensuring privacy is maintained.

Key Features:

  1. Complete MASP Transaction History: Users can access a full record of their transactions, neatly compiled in a CSV file. This includes details of all activities conducted maintaining a transparent and traceable personal record.

  2. User-Controlled Disclosure: This feature embodies our Protocol's core principle of voluntary disclosure. Users have complete control over the generation and sharing of their transaction history, empowering them to maintain privacy or provide transparency at their discretion.

How It Works:

  1. Viewing Transaction History: Users can view/search their past transaction via the interface within the History tab. This action triggers the compilation of their transaction history.

  2. Export: Users can click the export button and download transaction history in csv file.

Use Cases:

  • Compliance and Reporting: For users requiring transaction history for compliance or reporting purposes, this feature provides a detailed and verifiable record without compromising privacy.

  • Personal Record Keeping: Users seeking to maintain personal records of their digital asset movements can utilize this feature for organized and accessible transaction history.

Note on Privacy and Security While the Historical CSV Data Export feature is designed to offer detailed transaction history, it is crucial to note that user privacy remains our paramount concern. All exported data is handled with strict privacy measures, ensuring that user identities and their association with public blockchain addresses remain confidential. Users are encouraged to safeguard their exported data with the same diligence they apply to their private keys and other sensitive information.

Last updated