Documentation Index
Fetch the complete documentation index at: https://docs.inkwell.finance/llms.txt
Use this file to discover all available pages before exploring further.
CONFIDENTIAL & PROPRIETARY © 2026 Inkwell Finance, Inc. All Rights Reserved. This document is for informational purposes only and does not constitute legal, tax, or investment advice, nor an offer to sell or a solicitation to buy any security or other financial instrument. Any examples, structures, or flows described here are design intent only and may change.
Pre-alpha vs production. Pages that describe “the operator holds the session-to-ephemeral-key mapping” describe today’s single-operator implementation. Production Dagon will distribute this custody across an Ika 2PC-MPC dWallet network — no single “operator” entity will hold the mapping, and no unilateral disclosure (lawful or otherwise) will be possible without the network agreeing. The two-party composition described here is strengthened, not weakened, by the migration. See Design Philosophy for the full decentralization roadmap.
What is protected
In normal operation, these parties cannot see these things:| Observer | Cannot see |
|---|---|
| Public (chain observer) | Order contents, identities, fills |
| Counterparty in the same batch | Who the counterparty is |
| Operator | Any individual order; any user identity beyond a session key |
| Credential issuer | Any order activity at all |
What is disclosable
Under a valid compelled process (a court order served on both the operator and the credential issuer):- The operator produces the session-to-ephemeral-key mapping for a named time window.
- The credential issuer produces the credential-to-PII mapping for the named participant.
- Joined, these resolve one specific user’s activity.
Why two parties
A single-party disclosure surface is a single point of compromise. A rogue query, a breached DB, or an overbroad warrant against one entity pulls out the whole tape. Two-party composition requires that both parties be compelled simultaneously and both comply. In practice this means:- The warrant must name both parties.
- Both parties must be under the jurisdiction of the issuing court (or served through mutual legal assistance).
- Neither party alone can be coerced into unilateral disclosure — the information simply isn’t there.
Scope
The selective-disclosure claim is scoped to process that reaches both the operator and the credential issuer through lawful channels. The instruments in scope are:- US federal grand jury subpoenas (Fed. R. Crim. P. 17).
- US administrative subpoenas within counsel-confirmed authority (OFAC, FinCEN, SEC / CFTC where applicable).
- Mutual Legal Assistance routed through DOJ OIA or direct treaty.
- EU national-authority production orders under the European Investigation Order (Directive 2014/41/EU) and national transpositions.
- Court orders in US, EU Member States, UK, Switzerland.
Not a privacy absolute
Dagon does not promise “never by leak” or “never by breach.” Those phrasings are unfalsifiable and therefore dishonest. What is provable is the shape of the disclosure path:- Normal operation: no identity visible to any single party.
- Compromise of one party: no identity surfaced (the other party still holds its half).
- Compelled process against both: one named user is resolved.