Cloak | TronCloak - Secure, private, anonymous transactions , HackaTron Season 4!

Project Name: Cloak -TronCloak :kangaroo:

Project Track: DeFi

Team Name: Cloak

Twitter : https://twitter.com/TronCloak

Project Website: troncloak.com

Contract : Verified

Team Member(s): @maaz @saadabban76

Dorahacks Project Link: Cloak | TronCloak | Buidls | DoraHacks

Video : Video

Project Info: Cloak offers confidential, private transactions with a fresh secure address using an intuitive and user-friendly interface.

Project Goal: The goal of the project is to provide a platform on the Tron blockchain that allows for secure and private transfer of funds using unique and anonymous addresses called stealth addresses . The use of cryptographic algorithms and one-time-use keys ensures that the financial information of users is kept private and secure. The project aims to provide a valuable tool for anyone who values privacy and security in their financial transactions.

Project Details: Cloak allows users to receive funds without revealing their identity or actual wallet address .Users would always receive funds through a unique address called a stealth or secret address. This address is anonymous and can only be linked to the intended recipient of the transaction, making it virtually impossible for anyone else to know the identity of the recipient or track their transactions. Cloak uses a one-time public key to generate a new address for each transaction, keeping your financial information private and secure. To use Cloak, you need to generate a unique cloak address, share it with the sender, and retrieve your private key to access the funds. Cloak is a valuable tool for anyone who values privacy and security in their financial transactions.

Lets take an example of Charlotte (receiver) and william (sender) to deeply understand whats happening behind the scene here:

.Charlotte generates a 'DontRevealMe(DRM)" key and a unique cloak address using cryptographic algorithms. The cloak address is used as a public key here.

.William looks up the cloak address and generates a one-time-use eph key. The sender combines his key with the cloak address to create a unique and anonymous stealth address, which is used to send assets to the charlotte.

.William then publishes his eph public key on the Tron network, allowing Charlotte to scan it for new keys. Charlotte periodically scans the registry for new keys and uses her DRM key to generate stealth addresses associated with her.

.If Charlotte matches assets associated with a stealth address generated using a ephpublic key from the registry, she can compute the spending key or private key for that address and claim the assets. The one-time-use keys used to generate the stealth addresses are discarded to ensure privacy and security.

In summary, Cloak uses cryptographic algorithms and one-time-use keys to create anonymous and secure public addresses for transactions on the blockchain. These addresses can also be associated with domain names through Name Services and can be generated and claimed using ephemeral keys and public key registries.

Lets understand in practice.

Step 1 : Generate a unique cloak address by clicking the generate button. The 'DontRevealMe 'key generated will serve as your secret key, so be sure to save it in a secure location.

Step 2 : Send the cloak address to the intended sender.

Step 3 : The sender will create an address by pasting the receipents cloak address and the amount from and send funds to it using the send button.

Step 4 : After the funds have been sent, click on match or paste your secret key (optional) to retrieve your private key and access the specific address on which the funds have been sent.

Smart Contract links: GitHub - ScriptKiddii/Cloak: TronCloak offers confidential, private transactions with a virtual secure address using an intuitive and user-friendly interface.

.
.

Project Milestones:
At Cloak, we are always looking to improve our platform and provide our users with the best possible experience. Moving forward, we plan to focus on enhancing the functionality of our app we will be also integrating NFT capabilities and streamlining the user interface to make it more user-friendly and accessible to a wider audience. Our team is dedicated to staying at the forefront of blockchain technology and continuing to innovate in order to provide our users with the most secure and private financial transactions possible . also we have plans to implement cross-chain support in the near future, allowing our users to seamlessly transfer funds between different blockchains. This will enable our users to take advantage of the unique features and benefits offered by different blockchains, while still enjoying the security and privacy of the Cloak platform. We believe that cross-chain support is the future of blockchain technology and are excited to be at the forefront of this development

.
.

If you dont understand the working here is very easy and simple explaining for you :smiling_face_with_three_hearts::

Here it is ; Stealth address is that type of address that is created with receivers public key and senders private key but only receiver can control the address.

So in crypto when you want to receive transaction you send your wallet address to sender to receive transaction right?
But that create a problem everyone in the world can see that u receive such transaction from that address .While here instead of sending your actual wallet address to the sender you would send the "cloak address " the cloak address would be generated from your random private key called DontRevealMe key .

Everytime you would generate a cloak address it would be different from other ,( imagine cloak address as your public address)
Now you would send your cloak address to sender to receive transaction .sender would generate an stealth address by combining your cloak address (public key) with his ephemeral private key ( you can suppose ephemeral private key as random numbers that would be generated on demand) while he would also publish his ephemeral public key generated from his ephemeral private key on registry .

The receiver would then scan the registry combine all ephemeral public key with his "DontRevealme(DRM) " key to compute the private key of that specific stealth address .He would then generate the private key then he can control that specific address funds.

It seems so complicated here right yes it is :smiling_face_with_tear:! But you dont have to worry at all we created it extremely user friendly you dont have to worry about doing all this stuff like combining and scanning you would just use send and receive button to send and receive crypto.
If you still dont understand plz watch our demo video . Thankyou :grinning:

.
.

Thanks for Reading

The app is now live on mainnet. Feel free to ask questions and submit feedback

24 Likes

You are welcome, hmm talking about secret address and others I have seen some Blockchains talking about privacy and others but I havent tried one to see how it works. Checked your steps and I think its not all that easy even for some of us who have been in the system for a while Cant you simplify it for us.

7 Likes

Bienvenido a este S4, concuerdo con @Prince-Onscolo de que no resulta f獺cil aunque lleves tiempo en el sistema, me parece una gran idea, me gustar穩a pudiera simplificarse para los usuarios, si es posible

4 Likes

I like the example you gave on this dont revealme and cloak. It gives readers more insight on the message youre trying to pass across. Nice project :+1:

3 Likes

Thanku :pray:Im glad to hear that you found it helpful and insightful.

2 Likes

muchas gracies @antonio

2 Likes

Yes for sure just let us know about following concept you find difficult to understand.

2 Likes

Welcome to Grand hackathon season 4, wish you all the best :handshake:

4 Likes

Thank you. For me the whole process.
We know in crypto you just have to copy your address give it to the sender and he will paste it and send you the coin or token he wants to send.
With yours, I have to generate a cloak address, the sender will generate address from the cloak address and send the intended token. I think that should be fine and tokens should be I my wallet, but I have paste dontrevealme key.
Which means at the first stage I will get the cloak address and dont reveal me key

2 Likes

Thanks for such a wonderful idea but what are the alternative backup plans for lost/ misplaced keys?

2 Likes

Here it is ; Stealth address are that type of address that is created with receivers public key and senders private key but only receiver can control the address.

So in crypto when you want to receive transaction you send your wallet address to sender to receive transaction right?
But that create a problem everyone in the world can see that u receive such transaction from that address .While here instead of sending your actual wallet address to the sender you would send the "cloak address " the cloak address would be generated from your random private key called DontRevealMe key .

Everytime you would generate a cloak address it would be different from other ,( imagine cloak address as your public address)
Now you would send your cloak address to sender to receive transaction .sender would generate an stealth address by combining your cloak address (public key) with his ephemeral private key ( you can suppose ephemeral private key as random numbers that would be generated on demand) while he would also publish his ephemeral public key generated from his ephemeral private key on registry .

The receiver would then scan the registry by combininh all ephemeral public key with his "DontRevealme " key to compute the private key of that specific stealth address .He would then generate the private key then he can control that specific address and can access funds in it.

It seems so complicated here right yes it is! But you dont have to worry at all we created it extremely user friendly you dont have to worry about doing all this stuff like combining and scanning you would just use send and receive button to send and receive crypto.
If you still dont understand plz watch our demo video . Thankyou
@Prince-Onscolo

5 Likes

Thank you very much for your response

3 Likes

If you have any further question dont hesitate to mention us

1 Like

Thanks for the positive response guys, appreciate it :white_heart:

1 Like

Alright thanks for the explanation
I will watch the demo

1 Like

Such a great initiative, welcome to the grand hackathon and wishing you all the best.

I have a few concerns i would like to raise, wouldnt your approach help people to fund terrorist without a trace of where the funds are coming from and wouldnt it also aid in money laundering?

I remember a project that was doing this anonymous transaction and was later banned, (i will get the name for you)

Is your approach even legal in the financial world? Cos if it is then it will be a very lovely approach to stay anonymous.

Thank you and keep building

2 Likes

So the private key that the sender possess, is it one time? Or its the same for every transaction?

1 Like

Gracias por la informaci籀n, para poder ver lo complicado o no que resulta, se debe probar, entonces hablamos.

3 Likes

No its not same for every transaction private key is 256-bit random number which is generated on demand , would always create a different output .

1 Like

Thank you for your question. Yes, you are correct . Tornado Cash raised concerns about illegal activities. However, its important to note that the technology itself is not illegal, and its up to the users to ensure that they are using it responsibly and legally.

Regarding the ban on Tornado Cash, its true that its difficult to fully ban the technology itself, as the smart contract code is always available on the blockchain

Second, its important to note that Cloak is not designed to facilitate illegal activities. Its simply a tool that allows users to maintain their financial privacy on the Tron blockchain. Its up to the users to ensure that theyre not using the technology to facilitate any illegal activities.

@Nana66419

2 Likes