Compliance

Privacy at Hinkal is built on a foundation of integrity to ensure it remains a viable solution for regulated entities

1. KYT & Pool Integrity

Hinkal enforces real-time screening at the smart contract level through integration with Chainalysis. Transactions involving sanctioned or illicit addresses are blocked before entering the confidential smart contract, preventing contamination and preserving smart contract integrity.


2. Selective Disclosure

Hinkal uses a viewing key model that allows users to selectively disclose transaction history to auditors, regulators, or counterparties when required.

This includes:

  • Full transaction history disclosure

  • Granular or partial selective disclosure (specific transactions or time ranges)

Users remain in control of what is shared and with whom.


3. Front-End Compliance Controls (Hinkal Interface Only)

When users interact through Hinkal-operated interfaces (e.g., pay.hinkal.io, send.hinkal.io, Hinkal Wallet or the Hinkal Pay Enterprise Dashboard), additional access and compliance controls may apply.

For high-value flows, Hinkal supports zkTLS-based verification. This enables privacy-preserving verification of exchange ownership without publicly exposing user data.

The Hinkal Pay Enterprise Dashboard is a permissioned interface. Access is granted through enterprise credentials.


Compliance Options for SDK Integrators

Hinkal provides multiple integration models depending on the regulatory posture of the integrator.

Option A — Integrator-Verified Compliance

The integrator retains full compliance responsibility.

  • The integrator is added as an approved signer in Hinkal’s access control contract.

  • For each transaction initiated by their users, the integrator submits a signed attestation confirming compliance approval.

  • The signed message is included in the transaction calldata.

In practice, most integrators already conduct KYC/KYB. This option allows them to reuse existing compliance processes.


Option B — Optional Traceability Configuration

For integrators seeking permissionless setup for thier users, Hinkal offers an optional traceability configuration that stores encrypted sender-recipient linkage data off-chain.

  • Hinkal operates as a permissionless protocol.

  • The sender-recipient mapping remains private and is never exposed on-chain.

  • Encrypted traceability records are maintained solely by Hinkal in its internal compliance database.

  • In the event of a lawful request from a relevant authority, Hinkal is able to provide a full transaction trace to support regulatory obligations.

How it works:

During shield and unshield transactions, the relayer observes the destination address. This allows Hinkal to securely record the sender-recipient link, ensuring traceability is available if needed — while preserving user privacy by default.


Option C — zkTLS / KYC via Approved Partners

For higher assurance use cases, Hinkal supports privacy-preserving identity verification flows via approved third-party providers.

This enables:

  • CEX verification via Reclaim - no data is shared with Hinkal

  • Privacy-preserving KYC/B via zkMe

All without exposing sharing user data with Hinkal.

Last updated