🛡️Security
Xtreamly uses Lit Protocol to handle encryption, authentication, and access control without relying on centralized secrets or private key storage.
What Lit Provides
Keyless Signing Lit Nodes perform distributed cryptographic signing using threshold key shares. No private keys are stored on-device or on-server.
Programmable Access Control Conditions (ACCs) We define custom, on-chain or off-chain conditions for access to APIs, trading accounts, or encrypted data. Example: unlock trading only when a user's wallet holds a valid NFT or passes a DAO vote.
Threshold Encryption & Decryption Sensitive payloads — such as trading instructions, config files, or model weights — are encrypted client-side and can only be decrypted if ACCs are satisfied. Decryption occurs via a distributed node network.
Why It Matters
No central key management
No single point of failure
Access logic is transparent, composable, and enforceable on-chain or off-chain
Safer automation for capital routing, trading, and role management
Last updated