nasa-53884-unsplash.jpg

The Blacklist

Track and Recover.

 

 

 

Flag, track and recover stolen funds.

Thieves rely on services like exchanges, liquidity providers, and remixes to escape with stolen assets.

By tracking stolen funds and flagging suspicious wallet addresses, The Blacklist empowers platforms, services and authorities to prevent thieves from exiting their system and benefiting from crime. 

Counterbalancing measures ensure The Blacklist remains fair and flexible while not prone to abuse or unnecessary control.

The Approach


 

Off-Chain Transaction Graph
The Blacklist maintains an off-chain graph of all addresses and transactions. Once theft is detected, all transactions sending stolen tokens can be traced.

On-Chain Blacklist
Blacklisted addresses will be continuously transferred to a smart contract. External parties can query this smart contract to determine whether or not an address is blacklisted.

Machine Learning Filtering
Machine learning classification to increase precision, and make The Blacklist itself robust against attack and manipulation.

Governance
The Blacklist code is open source. Soon, the Project will develop a consensus mechanism enabling multiple parties to verify the blacklist. We will open bounties to encourage continued development of the technology.

 

OPEN SOURCE


The Blacklist code is open source.  CDA will develop a consensus mechanism enabling multiple parties to verify The Blacklist.  Bounties will encourage continued development of the technology and best practices in its implementation and iteration.