SeedPay
Security

Security Overview

Security model, threat landscape, and privacy guarantees of SeedPay.

SeedPay's security model is built on three pillars: privacy (unlinkable on-chain payments), payment verification (blockchain as source of truth), and economic attack resistance (bounded losses, front-run resistance).

Threat Model

SeedPay considers the following adversaries:

AdversaryCapabilitiesMitigations
Blockchain observerCan see all on-chain transactionsECDH session keys — no peer_id or IP on-chain
Network eavesdropperCan observe TCP connectionsMSE tunnel encrypts all SeedPay messages
Malicious seederMay send corrupted data or refuse to serveBitTorrent hash verification, bounded loss per piece
Malicious leecherMay refuse to pay after receiving dataSeeder tracks payment checks before serving
Sybil attackerCreates many fake identitiesEconomic cost of channel opening deters spam

Key Guarantees

  • No peer_id on-chain — blockchain observers cannot link wallets to swarm activity
  • Session unlinkability — different sessions produce different Session_UUIDs
  • Forward secrecy — ephemeral keys are deleted after sessions
  • Bounded loss — maximum loss per session is bounded by channel deposit (leecher) or cost of 1 piece (seeder)
  • Front-run resistance — smart contract enforces monotonically increasing amounts

Deep Dive

On this page