Data Sovereignty and User Controls
Users can:
Revoke data access at any time
Delete or migrate their encrypted data vault
Export full audit logs of their data usage
Opt out of analytics, updates, or smart contract events
Every interaction is logged on-chain—creating a tamper-proof audit trail while protecting individual privacy through advanced cryptography.
Last updated