# Abyss ## Docs - [Anonymity Set Growth and Entropy](https://docs.useabyss.com/ai-tools/claude-code.md): Analyzes how privacy strength evolves over time in Abyss and the conditions under which unlinkability is maximized. - [Single Pool Design Rationale](https://docs.useabyss.com/ai-tools/cursor.md): Explains why Abyss uses a single global anonymity pool and how this maximizes privacy, composability, and economic efficiency. - [Temporal Privacy and Withdrawal Timing](https://docs.useabyss.com/ai-tools/windsurf.md): Examines how time, scheduling, and withdrawal behavior affect unlinkability and how Abyss enables strong temporal privacy without enforced delays. - [Design Principles and Non-Goals](https://docs.useabyss.com/development.md): Establishes the architectural constraints that shape Abyss and clarifies what the protocol deliberately does not attempt to solve. - [Deposit Semantics and State Transitions](https://docs.useabyss.com/essentials/code.md): Formalizes how assets enter Abyss, how protocol state evolves, and how privacy invariants are preserved at deposit time. - [Infinite Withdrawal Model and Balance Accounting](https://docs.useabyss.com/essentials/images.md): Defines how Abyss supports multiple, arbitrary withdrawals from a single deposit while preserving unlinkability and preventing balance inflation. - [Asset Normalization via the $V Token](https://docs.useabyss.com/essentials/markdown.md): Explains how Abyss abstracts heterogeneous assets into a single privacy-preserving representation to eliminate provenance leakage. styling in standard markdown - [Commitments, Nullifiers, and Anonymity Sets](https://docs.useabyss.com/essentials/navigation.md): Formalizes how Abyss represents ownership, prevents double-spends, and achieves unlinkability at scale. - [Zero-Knowledge System Overview](https://docs.useabyss.com/essentials/settings.md): Describes the zero-knowledge architecture underpinning Abyss and how cryptographic proofs enforce private yet verifiable state transitions. - [Auditability Without Linkability](https://docs.useabyss.com/guides/compliance-aware-privacy/auditability-without-linkability.md): Demonstrates how Abyss preserves full system auditability while cryptographically preventing transaction graph reconstruction. - [Privacy vs Surveillance](https://docs.useabyss.com/guides/compliance-aware-privacy/re.md): Distinguishes cryptographic privacy from evasion, and clarifies the role Abyss plays in modern financial systems. - [Merchant Payments and Transaction History Minimization.](https://docs.useabyss.com/guides/compliance-aware-privacy/untitled-page.md): Explains how Abyss enables private, compliant payments by eliminating counterparty access to historical financial data. - [Deposit Flow](https://docs.useabyss.com/guides/transaction-lifecycle/deposit-flow.md): Defines how publicly traceable assets cross the privacy boundary and become cryptographically represented value inside Abyss. - [ Redemption and Re-Entry into DeFi](https://docs.useabyss.com/guides/transaction-lifecycle/re.md): Describes how privately withdrawn value exits the Abyss privacy domain and re-enters the broader on-chain economy without reintroducing historical linkage. - [Withdrawal Flow](https://docs.useabyss.com/guides/transaction-lifecycle/withdrawal-flow.md): Defines how private value exits Abyss through zero-knowledge authorization without reintroducing address-level linkage. - [Circuit Constraints and Soundness](https://docs.useabyss.com/guides/zk-proof-construction-and-verification/j.md): Details how the ZK circuit is constructed to prevent forgery, inflation, and correlation, and why invalid state transitions are cryptographically impossible. - [Proof Statements and Witness Structure](https://docs.useabyss.com/guides/zk-proof-construction-and-verification/proof-statements-and-witness-structure.md): Specifies exactly what is proven, what remains private, and how zero-knowledge enforces correctness without disclosure. - [On-Chain Verification and Gas Economics](https://docs.useabyss.com/guides/zk-proof-construction-and-verification/untitled-page.md): Explains how Abyss verifies zero-knowledge proofs on-chain efficiently, and why verification cost is predictable, bounded, and economically sustainable. - [Introduction](https://docs.useabyss.com/index.md) - [Privacy Model and Threat Assumptions](https://docs.useabyss.com/quickstart.md): Formalizes what Abyss protects, against whom, and under which conditions privacy holds. ## OpenAPI Specs - [openapi](https://docs.useabyss.com/api-reference/openapi.json) ## Optional - [Documentation](https://mintlify.com/docs) - [Blog](https://mintlify.com/blog)