Security
Falling victim to a brute force attack is always a possibility as the processing power of commodity computing systems continues to improve. LX uses state-of-the-art commercially available cryptographic and hashing methods to achieve the smallest possible brute force attack surface. That includes the use of proven key management techniques as well as zero knowledge file systems (Zk-Roll ups) and IPFS.
Last updated
Was this helpful?