Architectural Overview
The Verdant Privacy protocol operates on a modular five-layer stack. This separation of concerns ensures that the identity management, execution logic, and network obfuscation processes remain distinct, minimizing the attack surface for side-channel analysis.
Verdant is built natively for the Solana Virtual Machine (SVM). It leverages the high throughput and low latency of Solana to execute complex, multi-transaction privacy patterns that would be cost-prohibitive on other chains.
The Stack Hierarchy
The architecture flows from the user (top) to the network (bottom).
L01: Identity Layer
Handles key management, encryption, and the deterministic derivation of Persona shards.
L02: Intent Engine
Acts as the translation layer. It converts user goals (Intents) into executable instruction sets.
L03: Split Engine
The fragmentation logic. It calculates mathematical divisions of assets to defeat amount-based tracking.
L04: Routing Engine
Manages the graph traversal. It determines the specific path and sequence for shard interactions.
L05: Fog Layer
The obfuscation layer. It generates entropic noise and manages traffic timing to mask behavioral patterns.
Last updated
