Hide&Seek

Unlink wallet transactions & analyze wallet privacy via on-chain knowledge graphs.

Hide&Seek

Created At

ETHGlobal New Delhi

Project Description

Hide&Seek – Detailed Project Description

Hide&Seek is a blockchain privacy and wallet security solution designed to solve two core problems: on-chain linkability and wallet vulnerability exposure. Many users unknowingly leave permanent traces when they interact with exchanges, DeFi protocols, or other wallets, making their financial history, token holdings, and even personal identities potentially discoverable. Hide&Seek aims to both unlink wallet flows and assess privacy risk in a transparent, user-friendly way.

Core Features:

Private Wallet Transfers (Unlinking Funds)

Users often have wallet addresses permanently linked to exchanges like Binance or other wallets, creating a traceable financial history. Hide&Seek allows users to transfer funds to a new wallet without leaving a public on-chain link.

This is achieved by:

Converting all assets in the source wallet into a single token.

Sending this token through a privacy network (e.g., a secret ParaTime) using HTLC-assisted swaps and Fusion+ style atomic swaps.

Routing funds to a destination wallet, swapping back if necessary.

The result: funds arrive at the new wallet with no traceable connection to the original wallet on-chain.

Wallet Vulnerability Analysis

Hide&Seek analyzes wallet activity to evaluate potential privacy risks.

Using APIs like The Graph, it queries transaction history, resolves ENS names, and examines related tokens and entities.

A knowledge graph is built linking wallets, transactions, ENS names, and potentially exposed social or portfolio profiles.

By analyzing the graph, Hide&Seek produces a vulnerability score that reflects how easily a wallet could be linked to real-world identities.

Knowledge Graph & Privacy Reporting

The system can expand the wallet’s transaction graph to detect indirect links to other wallets, exchanges, or social identities.

Users receive a human-readable report showing:

Linked ENS names

Associated wallets

Detected public profiles (Twitter, LinkedIn, GitHub, portfolios)

Estimated vulnerability score (1–10)

Weak or indirect evidence is cited clearly to avoid false conclusions.

Benefits for Users:

Privacy-first transfers: Unlink your funds from past wallet activity and maintain anonymity.

Awareness of exposure: Know how much your wallet activity reveals about you.

Control over identity: Decide when and how your financial footprint is visible.

Compliance-friendly design: While providing privacy, operations can optionally allow selective disclosure using cryptographic proofs.

Technical Summary:

Integrates on-chain swaps, HTLC bridges, and privacy ParaTimes for unlinking.

Queries blockchain subgraphs and APIs to resolve addresses, ENS, and transactions.

Builds and analyzes a knowledge graph for linked wallets and entities.

Generates a privacy vulnerability score and detailed report.

Use Cases:

Users wanting to break traceable links to exchanges or old wallets.

Individuals seeking to audit their privacy risk before interacting with DeFi or NFT protocols.

Security-conscious users needing knowledge-graph insights on wallet exposure.

How it's Made

How It’s Made — Hide&Seek (Implementation Details)

Overview: Hide&Seek has two main components:

Privacy Routing Engine: Moves funds from a source wallet to a fresh destination wallet without leaving linkable traces.

Privacy Analysis Engine: Builds a knowledge graph from on-chain + off-chain signals and uses an LLM to assess privacy exposure.

Tech Stack:

Frontend: React + Next.js, TypeScript, Tailwind CSS

Graph visualization: Cytoscape.js

Backend: Node.js (TypeScript) + Express/Fastify

Graph storage: Hypergraph

Blockchain access: Alchemy / QuickNode / Graph Token API, ethers.js

ENS resolution: The Graph (ENS subgraph)

Swaps & routing: 1inch Fusion+ HTLCs

Private ParaTime: Secret Network

LLM analysis: OpenAI (prompt-driven vulnerability scoring)

Privacy Analysis Flow:

User submits wallet → backend fetches transactions via Graph Token API / Alchemy.

ENS and social handles resolved (GitHub, Twitter, LinkedIn).

Build in-memory knowledge graph (wallets, transactions, ENS links).

Graph passed to LLM → outputs summary, estimated location, vulnerability score.

UI shows interactive graph + human-readable report.

Private Transfer Flow:

Single-token funneling: swap all assets to one token via 1inch.

HTLC + bridge → transfer to Secret Network (mixing, encrypted state).

Exit HTLC → swap to destination wallet, unlinkable on-chain.

Post-transfer verification confirms no direct links.

Notable Bits:

Single-token funnel reduces correlation vectors.

HTLC state machine coordinates transfers + relayer calls.

LLM prompt engineering produces structured OSINT output.

Batching & randomized timing mitigate timing attacks.

Data Model:

Wallet: { address, ens?, metadata? }

Transaction: { fromWallet, toWallet, token, amount, timestamp, txHash }

Knowledge graph supports queries like “ENS→social linkage” and “2-hop ENS exposures.”

background image mobile

Join the mailing list

Get the latest news and updates