🛡️Security

Xtreamly uses Lit Protocol to handle encryption, authentication, and access control without relying on centralized secrets or private key storage.

What Lit Provides

  • Keyless Signing Lit Nodes perform distributed cryptographic signing using threshold key shares. No private keys are stored on-device or on-server.

  • Programmable Access Control Conditions (ACCs) We define custom, on-chain or off-chain conditions for access to APIs, trading accounts, or encrypted data. Example: unlock trading only when a user's wallet holds a valid NFT or passes a DAO vote.

  • Threshold Encryption & Decryption Sensitive payloads — such as trading instructions, config files, or model weights — are encrypted client-side and can only be decrypted if ACCs are satisfied. Decryption occurs via a distributed node network.

Why It Matters

  • No central key management

  • No single point of failure

  • Access logic is transparent, composable, and enforceable on-chain or off-chain

  • Safer automation for capital routing, trading, and role management

Last updated