Event & Proof Logging
Event & Proof Logging defines how ZKFund records what happened without recording what was done.
Instead of treating logs as a history of actions, ZKFund treats logs as cryptographic evidence of correctness.
This distinction is fundamental to preserving long-term privacy.
Why Traditional Event Logs Fail
Standard on-chain event logs are designed for transparency:
They reveal parameters
They expose participants
They allow full historical reconstruction
Even when values are masked, patterns accumulate over time.
For private funds, this turns logs into:
Strategy disclosures
Behavioral fingerprints
Permanent intelligence archives
ZKFund deliberately rejects this model.
Proof-First Logging
ZKFund replaces traditional events with proof receipts.
A proof receipt is a minimal on-chain record that proves:
an action was authorized
execution followed governance rules
settlement completed correctly
It does not describe the action itself.
Think of it as a cryptographic “pass/fail” record, not an activity log.
What Is Logged
Each proof receipt may include:
proposal or action reference
execution status (success / failure)
proof verification hash
timestamp or epoch marker
This is the minimum required to:
verify system correctness
prevent replay
support audits
Nothing more is recorded.
What Is Never Logged
Proof logging explicitly avoids recording:
asset types or amounts
sender or recipient addresses
execution routes
internal approvals
intermediate state changes
There is no transaction graph to analyze.
Verifiability Without Visibility
Anyone can:
verify the proof
confirm rule compliance
check execution finality
No one can:
infer strategy
track capital flows
correlate actions across time
The system remains publicly verifiable but operationally opaque.
Log Isolation & Non-Correlation
Each proof receipt is:
context-bound to a single action
non-linkable to other receipts
unusable for behavioral analysis
Even repeated actions produce receipts that cannot be meaningfully correlated.
Support for Audit & Compliance
For audit purposes:
proof receipts serve as immutable evidence
auditors verify correctness via proofs
selective disclosure can extend context when approved
Logs do not need to be expanded to support audits.
Why Proof Logging Is Safer Than Redaction
Redacting logs still leaks structure. Proof logging never creates structure to redact.
There is no data accumulation risk. There is no future de-anonymization threat.
Last updated