Access Control

General policy

Keyring Pro

Keyring Services have access to storage locations at Basis Theory and Compliance Partners. Instead, they enable users to securely upload their data to Basis Theory's encrypted servers for ingestion by Compliance Partners. The exchange of raw user data is triggered by a proxy forwarding request from Basis Theory. To get more information on Basis Theory’s architecture and processes, here is a link to their documentation.

Keyring Connect

The user retains full control and privacy over their data. During the generation of the proof, the user is informed of which specific data points will be revealed and securely stored in Basis Theory. We do our utmost to keep this information to the strict minimum required to verify the user's claim. Only these minimal data points are ever stored and accessed by our services during the attestation generation.

Regulatory compliance access

Keyring’s solution fully breaks the link between real-life identity and trading wallets for best-in-class security and privacy. This means that even Keyring’s ability to reconstitute that link is mitigated. That being said, some parties such as law enforcement might need to see who’s behind a wallet, potentially with a subpoena. For that reason, we have included a Regulatory Backdoor in our architecture to enable certain whitelisted parties to come together to unmask that link via threshold decryption. This feature is in beta mode at the moment, with Keyring Governance holding the only private key. Keyring Governance will be responsible for accepting new key holders in the system.

Policy Owners can opt in and out of this feature when creating an Admission Policy. If toggled on, Users are required to encrypt their identity link breadcrumbs with a corresponding public key, that can only be decrypted by certain private keys, the Policy’s Regime Keys.

Last updated