A common misconception about privacy protocols is that privacy necessarily undermines auditability. Abyss is designed around the opposite principle: auditability and unlinkability are orthogonal properties. One concerns system correctness. The other concerns information exposure. Abyss preserves the former while eliminating the latter.Documentation Index
Fetch the complete documentation index at: https://docs.useabyss.com/llms.txt
Use this file to discover all available pages before exploring further.
VI.3.1 What Remains Auditable
At all times, any observer can verify that the Abyss protocol satisfies the following global invariants:- On-chain verification of zero-knowledge proofs
- Public nullifier registries
- Public Merkle roots representing the commitment set
- Deterministic contract logic
VI.3.2 Separation of Concerns
Abyss enforces a strict separation between:- Correctness data, which is public and verifiable
- Identity data, which is never revealed
VI.3.3 Regulatory and Institutional Audits
For institutions, this model enables a new class of audits. Auditors can:- Verify aggregate inflows and outflows
- Confirm absence of inflation or double-spends
- Validate contract upgrades and parameter changes
- Inspect ZK verifier correctness
VI.3.4 Selective Disclosure (Out of Scope, By Design)
Abyss does not implement selective disclosure at the protocol level. Users may voluntarily disclose secrets or proofs to third parties if required, but the protocol does not embed identity hooks or backdoors. This ensures neutrality. The protocol enforces privacy by default and does not privilege any observer.VI.3.5 Why This Matters
Auditability without linkability allows Abyss to function as:- Payment infrastructure
- Settlement rails
- Privacy middleware for exchanges and markets

