Access Control
General policy
Keyring Pro
Keyring Services have access to storage locations at Basis Theory and share raw user data with Policy Owners or across Policies by triggering by a proxy forwarding request from Basis Theory. To get more information on Basis Theory’s architecture and processes, here is a link to their documentation.
Keyring Connect
The user retains full control and privacy over their data. During the generation of the proof, the user is informed of which specific data points will be revealed and securely stored in Basis Theory. We do our utmost to keep this information to the strict minimum required to verify the user's claim. Only these minimal data points are ever stored and accessed by our services during the attestation generation.
Regulatory compliance access
Keyring’s solution fully breaks the link between real-life identity and trading wallets for best-in-class security and privacy. This means that even Keyring’s ability to reconstitute that link is mitigated. That being said, some parties such as law enforcement might need to see who’s behind a wallet, potentially with a subpoena. For that reason, we have included a Regulatory Backdoor in our architecture to enable authorised parties to unmask that link via threshold decryption. Users are required to encrypt their identity link breadcrumbs with a corresponding public key, that can only be decrypted by certain private keys, the Policy Owner’s Regime Keys.
Last updated