Transaction Flow
Every Crosterix action follows the same private, secure process:
Step 1 Generate Stealth Address
When you enable Stealth Mode, Crosterix creates a temporary address for that specific operation using ECDH cryptography. No one can trace this address back to your main wallet.
Step 2 Local Signing
All transactions are signed inside your connected wallet. Crosterix never accesses your keys or stores signatures — everything stays in your control.
Step 3 Execute Action
Depending on what you do:
Private Swap: Executes through 1inch or 0x directly.
Stealth File Share: Encrypts the file via Lit Protocol → uploads to Lighthouse (IPFS).
Cross-Chain Bridge: Sends assets via Socket or Li.Fi to a stealth address on the target chain.
All communication happens between your browser and these decentralized networks never through Crosterix servers.
Step 4 Blockchain Confirmation
The transaction is confirmed on-chain as usual. Crosterix does not log, store, or retain any session or transaction data after completion.
Last updated
