10. Veil mode / Veiled transaction
Veiled Transactions
With Veil Mode, every transfer becomes a veiled transaction, where only the sender retains exclusive knowledge of both the originating wallet address and the receiver’s destination address. No third party—including the recipient—can trace the transaction path or identify the wallets involved.
Veil delivers transactional privacy through an innovative dual‑exchange relay architecture, in which two independent, non‑custodial partners interact via a randomized Layer 1 privacy bridge. This bridge severs the transactional linkage between sender and receiver, ensuring that no single entity can reconstruct the complete transaction path. The result is trustless, low‑cost, and verifiably private transactions across the Veil network.
Why This Architecture Works
1. Record Segregation
The first exchange partner manages the inbound leg of the veiled transaction—receiving user funds, executing the initial swap, and routing liquidity through a randomly selected Layer 1 bridge. The second exchange handles the outbound leg—converting the received liquidity into the recipient’s chosen asset and dispatching it to the specified destination wallet.
This separation ensures that neither exchange has full visibility into the end‑to‑end transaction, preserving privacy by design.
2. Single‑Use Wallet Addresses
To prevent cross‑transaction linkability, both exchanges generate single‑use wallet addresses for every veiled transaction. The first exchange interacts only with a newly generated deposit address of an unknown owner, while the second exchange sees funds arriving from another anonymous, one‑time wallet.
Neither party is aware that its counterparty is an exchange participant, further reinforcing the privacy barrier between transaction endpoints.
3. Randomized Layer 1 Bridges
Veil employs a randomly selected Layer 1 blockchain as a privacy bridge to disconnect the source and destination wallets. The bridge is chosen from a diversified pool of high‑liquidity, high‑throughput networks, including:
Solana (SOL)
Binance chain (BNB)
Tron (TRX)
The selected Layer 1 is randomized and undisclosed, tracing fund flows becomes practically impossible. Even if activity on one Layer 1 were analyzed, correlating inbound and outbound transactions across different blockchains is computationally infeasible.
Anonymity in Transaction Flow
By combining dual exchange partners, single‑use wallet addresses, and randomized Layer 1 routing, Veil ensures that no identifiable linkage exists between sender and receiver. Neither exchange nor any external observer can reconstruct the complete transaction pathway, maintaining end‑to‑end anonymity and safeguarding user confidentiality within the Veil ecosystem.
User Experience in Veil Mode
Initiate a transfer in Veil and select Veil Mode.
Choose the asset and specify the recipient.
Veil automatically orchestrates split‑flow routing and the randomized Layer 1 bridge behind the scenes.
The recipient simply receives the funds in their chosen asset. Their wallet never reveals the sender’s source wallet or the transaction path.
Last updated