๐ How Zor Works
At its core, Zor combines three ideas โ mixnets, zero-knowledge proofs, and shielded payments โ to create a network that protects both your privacy and your trust in the system.
๐ง
1. Mixnet Routing
Every packet you send is wrapped in multiple layers of encryption and passed through 3โ20 randomly chosen relays. Each relay peels one layer and forwards the message without knowing its origin or destination. If any hop fails, the network automatically reroutes through encrypted โrecovery capsules,โ keeping the connection alive without revealing anything about its path.
๐ 2. Proof-of-Forwarding
Unlike Tor or VPNs, Zor doesnโt rely on trust. Each relay produces a zk-proof inside a TEE vault, verifying that it correctly processed packets without reading or altering them. These proofs are aggregated and verified off-chain, ensuring fairness and accountability. No proof โ no payment.
๐ฐ 3. Shielded ZEC Payments
All payments happen privately through Zcashโs shielded pool. Users deposit small balances into the vault, and relays are rewarded with ZEC only after verified forwarding. Every transaction is unlinkable, but still auditable through zk-proofs of work.
๐ 4. ZCert Encryption
Apps and services on Zor use ZCerts โ hardware-attested keys that prove authenticity without relying on centralized certificate authorities. Itโs TLS, but without Big Tech โ a verified identity layer for the next web.
Last updated