Built with post-quantum cryptography and distributed secret sharing. Every layer designed to protect you.
Military-grade cryptography protecting every transaction
4 layers preventing front-running and manipulation
Hide until included
Random leader selection
No single view
No front-running
Comprehensive defense against all attack vectors
Every message is split into 10 shares. You need 7 to reconstruct — 6 or fewer reveal nothing.
No security system is perfect. Be aware of these limitations.
| Message Encryption | ChaCha20-Poly1305 + Shamir |
| Secret Sharing | Shamir's scheme, k=7, n=10 |
| Security Model | Information-theoretic (k-1 shares = zero info) |
| Signatures | ECDSA (secp256k1) |
| Hashing | SHA3-256 (Keccak) |
| Key Derivation | Argon2id (64MB, 3 iterations) |
| Implementation | Rust (memory-safe) |
For complete technical details, see our Whitepaper.
All AXIOM code is open source and available for inspection. Don't trust us — verify.
View on GitHub