Permissionless Use Case
Overview
The system has permissionless access. Power users and developers can interact with on-chain contracts, the relayer, and the SDK in a permissionless manner. They can build apps and scripts on top of it.
Participants can transact without prior approval, KYC gates, or centralized permissioning. Crypto-native flows (e.g., DeFi, P2P, self-custodial) where access is open by design.
Key Properties
- Open access — Anyone can participate without approval
- Self-custodial — Users hold their own keys
- No KYC gate — Participation not gated by identity verification (compliance may apply at fiat boundaries)
ZKP/EB Components and Features Used
| Component / Feature | Used? | How |
|---|---|---|
| TBD |
Open Questions
| # | Question | Context | Answer |
|---|---|---|---|
| TBD |