Lethe
  • Getting Started
    • Who we are
    • Official Links
    • TL;DR
    • Why Would I Use Lethe if I'm Not a Criminal?
  • Basics
    • Instructions
      • What We Do
      • Written Instructions
        • Private Send
        • Shield
        • Unshield
    • How Lethe Works
    • ZK Technology
    • Aren't You Just Enabling Criminals?
    • How We Differ From Other Privacy Protocols
    • Tokenomics
Powered by GitBook
On this page
  1. Basics

How We Differ From Other Privacy Protocols

People raise valid concerns about the amount of other (also amazing) privacy protocols in the space, but we differentiate ourselves in a couple ways.

Most cross chain bridges work like this:

1) They give you a wallet address which you send tokens to

2) They then check that the transfer was received, and send you the corresponding amount of tokens on another chain from their existing inventory immediately

It's relatively easy to track large cross-chain transactions because of this. One can just see the $ amount transferred on Chain A, and match it with the amount received on chain B

We are different because:

  1. We allow private deposits to “shield” your token balance, it doesn’t only have to be a swap

  2. You can send to a different wallet, or unshield your balance whenever (there's no time constraint)

  3. You can send or unshield parts of your private balance, nobody needs to know how much you have in your private balance,

PreviousAren't You Just Enabling Criminals?NextTokenomics

Last updated 3 months ago