Transaction Flow

Every Crosterix action follows the same private, secure process:

Step 1 Generate Stealth Address

When you enable Stealth Mode, Crosterix creates a temporary address for that specific operation using ECDH cryptography. No one can trace this address back to your main wallet.

Step 2 Local Signing

All transactions are signed inside your connected wallet. Crosterix never accesses your keys or stores signatures — everything stays in your control.

Step 3 Execute Action

Depending on what you do:

  • Private Swap: Executes through 1inch or 0x directly.

  • Stealth File Share: Encrypts the file via Lit Protocol → uploads to Lighthouse (IPFS).

  • Cross-Chain Bridge: Sends assets via Socket or Li.Fi to a stealth address on the target chain.

All communication happens between your browser and these decentralized networks never through Crosterix servers.

Step 4 Blockchain Confirmation

The transaction is confirmed on-chain as usual. Crosterix does not log, store, or retain any session or transaction data after completion.

Last updated