SettleMint
ArchitectureSecurity

Public chain privacy boundaries

How DALP separates public EVM chain data from off-chain identity and compliance records. Covers wallet visibility, identity claims, personal-data boundaries, and operator controls.

Purpose

Use this page before designing an asset, identity, or compliance flow on a public EVM chain.


Public-chain baseline

DALP operates on EVM networks. On public EVM chains, blockchain transactions and contract state can be read by anyone with access to that network. That includes token contract addresses, wallet addresses, transaction hashes, transfer events, and data written into smart contracts. Use the API Reference and CLI Command Reference to check the exact identity, claim, trusted-issuer, and token operations your flow uses.

Public-chain data has a different privacy profile from off-chain platform data:

Data surfaceVisibility boundaryOperator guidance
Wallet addressesVisible on the chain and linkable through transactionsTreat addresses as persistent public identifiers once used on a public network.
Token and compliance contract stateVisible according to the network and contract interfacesConfigure only the data required for issuance, transfers, and enforcement.
Transaction metadataVisible through transaction hashes, logs, and event historyAssume mint, transfer, burn, and administrative actions can be correlated on-chain.
KYC/KYB documents and verification filesProcessed off-chain through platform and verification workflowsKeep personal documents and detailed evidence off-chain.
Platform account dataStored and processed by the platform according to the legal privacy termsManage retention and access through platform controls and your data-processing obligations.

Identity and compliance boundary

DALP's identity and compliance model separates verification evidence from the on-chain enforcement records that tokens need for ERC-3643 style controls. The public API Reference, CLI Command Reference, and Identity & Compliance pages show the user-facing identity, claim, trusted-issuer, and compliance operations behind this boundary.

  • Identity documents and detailed KYC/KYB evidence are processed off-chain.
  • Wallets are connected to on-chain identities so token contracts can evaluate eligibility.
  • Identity records can be read by wallet address or by identity address, and can be checked with or without token context.
  • Trusted issuers and claim topics define which authorities and claim types can support transfer eligibility.
  • Claims can be issued to an identity, revoked from an identity, and reviewed through claim-history views.
  • Compliance modules evaluate configured rules during token operations such as minting, transfers, and burns.

This means DALP can enforce eligibility on-chain without requiring operators to publish identity documents on-chain. It does not make public-chain activity private. Wallets, token operations, identity addresses, trusted-issuer relationships, claim topics, issued or revoked claim references, and claim event history remain visible according to the network and registry surfaces used in the flow.

Current identity and claim surfaces

Use these surfaces when reviewing what a public-chain identity flow exposes. Use the public API reference to verify request and response fields, and use the CLI command reference to find the matching commands and flags before launch:

SurfaceWhat operators configure or reviewPrivacy boundary
Identity registryCreates, registers, reads, lists, searches, updates, and removes wallet-linked identity records.Wallet and identity addresses are identifiers. Treat them as public once they are registered or used in public-chain flows.
Identity lookupsReads an identity by wallet address, identity address, or current user, with optional token-specific claim validation.Token-specific validation can reveal which token context is being checked against the identity.
Claim issuanceIssues a signed claim to a target identity for topics such as KYC, AML, accreditation, investor type, or asset classification.Claim topics and on-chain claim references support enforcement; detailed evidence should remain off-chain.
Claim revocation/historyRevokes an existing claim and exposes chronological claim history for audit and operations.Revocation and history help operate compliance, but they do not hide prior public-chain activity.
Claim topicsLists, creates, updates, reads, and deletes the topic schemes that describe supported identity claims.Topic names and signatures should describe eligibility states, not personal documents or raw verification evidence.
Trusted issuersLists, reads, creates, updates, upserts, and deletes issuers and the topics each issuer is trusted to attest.Issuer identities and topic assignments can link an issuer to eligibility decisions.

What not to put on-chain

Do not place personal data, identity documents, raw KYC evidence, confidential commercial terms, or sensitive investor files into blockchain fields, contract metadata, claim payloads, claim references, token metadata, transaction notes, or uploaded documents that are intended to be publicly referenced.

Use neutral identifiers and off-chain records where possible. For example, a compliance workflow can record that a wallet is eligible for a claim topic without publishing the underlying passport, proof of address, sanctions report, or beneficial-ownership file on-chain.

Current controls and limits

DALP provides controls that help separate public enforcement from private evidence:

ControlWhat it helps withLimit
Off-chain verification workflowsKeeps supporting KYC/KYB evidence out of token contractsOperators still control what they submit to on-chain fields and public metadata.
Trusted issuers and claim topicsLets approved authorities support eligibility without publishing full evidenceThe existence of an identity, wallet, claim topic, or claim reference can still be visible on-chain.
Compliance modulesEnforces transfer, mint, and burn rules through contract checksEnforcement does not hide transaction history or wallet activity on public chains.
Platform access controlsLimits who can view and manage off-chain operational records in DALPAccess control cannot remove data already written to a public blockchain.

The legal privacy pages state the key operational boundary: data written to a public blockchain can be immutable and publicly accessible, and SettleMint cannot delete or modify on-chain data. Operators are responsible for ensuring personal data is not recorded on-chain in violation of applicable law.

Design checklist

Before launching on a public EVM network:

  1. Identify every field that will be written on-chain or referenced from on-chain records.
  2. Remove personal data and confidential files from token metadata, claim data, claim references, and transaction inputs.
  3. Keep detailed verification evidence in approved off-chain systems.
  4. Use claim topics and eligibility flags for enforcement instead of raw identity evidence.
  5. Confirm that issuer, custodian, registry, and operator addresses can be publicly associated with their actions.
  6. Review the Privacy Policy and Terms of Service for the legal treatment of blockchain data.

On this page