We expand transaction invalidation to include theft, meaning we censor thieves using math.
We built on Ethereum to preserve a benevolent user's right to their assets.
What math?
Used are a range of techniques for exploit detection.
Our A.I. model looks for anomalies, our exploit proofs look for patterns.
What if the math is wrong?
Transactions that are provably malicious have delayed inclusion.
Users who are falsely classified can access their assets via L1 forced inclusion.