Core Design Principles

ElizaPay Core Design Principles

ElizaPay is not “a wallet with AI.” It is a privacy-native execution system where the default mode of operation is: compute in darkness, output proofs and intents.

Below are ElizaPay’s core design principles, explained technically and operationally.

Privacy as an Architectural Invariant

Most fintech apps attempt privacy through policy (“we won’t store your data”). This fails because policy can change, logs can leak, and insiders can access systems.

ElizaPay enforces privacy through architecture:

  • Sensitive context is processed inside encrypted execution boundaries (TEE)

  • Outputs are limited to:

    • ZK proofs (verifiable statements without disclosure)

    • signed intents (what the agent wants to execute)

    • encrypted payloads (for relayers / connectors)

Result: Privacy persists even if servers are compromised or developers act maliciously, because plaintext never exists outside the enclave.

Minimum Disclosure by Design (“Prove, Don’t Reveal”)

Traditional financial systems demand disclosure:

  • bank statements for loans

  • full wallet history for “compliance”

  • identity-linked balances for authorization

ElizaPay replaces disclosure-based finance with proof-based finance.

Examples of ElizaPay proof claims

  • “User has ≥ 250 USDC available.”

  • “User’s solvency score meets the minimum threshold.”

  • “The payment is within allowed policy limits.”

  • “This transaction is consistent with agent risk rules.”

Rather than publishing account balances, ElizaPay publishes constraints satisfaction.

Enclave-First Compute (Trusted Execution as the Default)

ElizaPay assumes:

  • cloud servers are observable

  • databases will leak eventually

  • monitoring tooling captures too much

  • logs become liabilities

So ElizaPay flips the model:

  • all sensitive compute occurs inside a TEE

  • the host environment is treated as hostile

  • only safe outputs escape

This is not “we run secure servers.” This is: we run in a secure compute region even if servers are compromised.

User-Sovereign Agent Permissions

Agentic banking requires delegation. Without permissions, an agent is useless. With unlimited permissions, an agent is dangerous.

ElizaPay uses explicit, programmable, user-defined permissions, enforced cryptographically and within enclave runtime:

  • allowlists/denylists for destinations and protocols

  • spend caps and per-transaction limits

  • risk ceilings and slippage tolerances

  • time-based restrictions

  • mandatory co-sign for critical transactions

Result: ElizaPay creates the equivalent of “banking autopilot” with hard safety rails.

Secure Automation over Manual Operations

The goal is to eliminate:

  • repeated signing prompts

  • manual bridging and route selection

  • human error and phishing risk

  • exposure from repetitive transaction patterns

Instead, the agent executes atomic workflows:

  • simulate → verify → prove → route → settle → verify receipt

This provides a more “bank-like” experience while preserving crypto-native programmability.

Multi-Chain Composability without Multi-Chain Identity Leakage

Most multi-chain products leak identity because they reuse:

  • the same wallet address patterns

  • repeated bridging routes

  • correlated interactions

ElizaPay tries to reduce correlation by using:

  • privacy-preserving routing logic

  • intent-based execution

  • proof-based authorization

  • optional transaction pattern randomization (within policy)

This improves unlinkability without breaking compatibility.

Auditability without Observability

A core contradiction in privacy is: how do you audit a system you can’t see?

ElizaPay aims for:

  • verifiability (proofs, attestations, commitments)

  • without observability (no raw data, no internal state leakage)

This creates a new security posture:

You can verify correct behavior without the privilege of inspection.

Last updated