2. Threat Model
We defend against the union of all known and expected adversaries in 2025–2030:
Chain analysis firms
Full historical UTXO / account-model graph, clustering heuristics, exchange KYC off-ramps
No on-chain interaction originates from a repeatable address cluster; keys never persist
Exchanges (post-transaction freeze)
Subpoena power, retroactive flagging, travel-rule reporting
Transactions executed from keys that are mathematically impossible to link to the operator after shutdown
Nation-state seizure teams
Immediate physical acquisition, refrigerated DDR5, PCIe replay attacks, JTAG, Chip-off forensics
RAM shards zeroed before kernel halt begins; cold-boot attack window < 47 ms on DDR5
ISP / IX / Cloudflare
Deep packet inspection, JA3/S fingerprinting, TLS SNI logging, QUIC CID tracking
All traffic wrapped in seven-to-nine self-destructing relays with randomized TLS fingerprints per circuit
MEV bots & searchers
Real-time mempool scanning, sandwich, arbitrage, frontrunning
Circuit rebuilt every 60–90 s + artificial latency jitter; no two RPC calls ever use the same exit relay
Evil maid / border searches
Boot into forensic distro minutes after use
Boot medium overwritten; RAM zeroed; UEFI variables reset; no BIOS passwords to guess
Compromised firmware (Intel ME, AMD PSP)
Persistent implants below the OS
Bootloader verifies firmware hash on every boot (fails loudly if tampered); optional ME/PSP neutering script
Last updated