Silent Protocol
CtrlK
  • Introduction to Silent Protocol
    • What is Silent Protocol?
    • Protocol Owned Yield (POY) Model
  • Overview of EZEE
    • Traditional Privacy Framework
    • The Problem of State Denial
    • Towards Composable Privacy
    • EZEE
      • EZEE Signals
      • Applications of EZEE
    • 0dApps
  • Ghost Layer
    • The Ghost Layer
    • Protocol Owned Yield
      • Reward Distribution Layer
      • Silent Yield Farm
        • Integrations
      • Earn GHOST
        • Deposit Cap
        • GHOST Rewards
      • Earn SHHHHHHH
        • What makes SHHHHHHH valuable?
        • SHHHHHHH Tokenomics
      • Silent Points
    • Referral Program
  • The Silent Compliance Stack
    • Silent Compliance VM
      • Technical Implementation
    • Silent ID
    • Silent Protocol x Predicate
  • Miscellaneous
    • Audits & Security
    • Risks and Terms & Conditions
Powered by GitBook
On this page
  1. The Silent Compliance Stack

Silent Protocol x Predicate

Silent Protocol employs a Predicate Rule Check to validate conditions before updating the system’s state.

PreviousSilent IDNextAudits & Security

Last updated 3 months ago