Major update dropped on HyperLayer ZK New features: → QR Payment Requests w/ encrypted memos → zk-ID Module (STARK-inspired proofs) → Enhanced client-side cryptography All ops run client-side. Zero server trust required. Let me break it down 👇
QR Payment Requests 💳 • Custom protocol: zkhl://pay?d=<base64> • Supports USDC transfers on Solana • Optional memo encryption: PBKDF2 key derivation (100k iterations) AES-GCM 256-bit encryption • Passphrase NEVER embedded in QR • Camera scan + manual entry fallback
zk-ID Module 🔐 Ephemeral identity system with STARK-inspired proofs • Ed25519 keypair generation (client-side) • 30-min auto-expiry • Commitment anchoring via SHA-256 • Challenge-response signature verification No private keys ever leave your browser.
zk-ID Security Stack: ┌─────────────────────────────┐ │ Secret Key Encryption │ │ → AES-GCM 256-bit │ │ → PBKDF2 key derivation │ │ → Session-bound salt │ └─────────────────────────────┘ Export contains ONLY: • Public key • Commitment • Proof (no private material)
Proof Generation Flow: Generate commitment = SHA256(pubKey + nonce) Challenge = SHA256(commitment + timestamp + proofNonce) Response = Ed25519.sign(challenge + commitment + timestamp) Verify: recompute commitment, validate signature Forgery = computationally infeasible ✅
Use Cases: • Payment signing verification • Session-bound identity for E2EE messaging • Disposable identity for privacy-critical txs • Cross-platform identity attestation All without revealing your seed phrase or priv
1.82K