Web3Privacy EyeExplorer Logo
C
infrastructure

Curvy is the privacy infrastructure layer for on-chain payments - built for the wallets, applications, and AI agents. On the surface, users get human-readable usernames as a frictionless entry point for receiving crypto. Under the hood, every payment is automatically routed through programmable smart contracts using ZK proofs: a fresh address is generated per transaction, funds are shielded from balance exposure and transaction graph analysis, and time-based correlation attacks are prevented by design. The result is end-to-end cross-chain privacy with a user experience identical to a normal wallet transfer. What makes Curvy distinct is the combination of three properties no existing solution delivers together: invisible UX (privacy requires no action from the user or the agent), embedded compliance and adjustable infrastructure (wallets, DeFi apps, payment platforms, and AI agent frameworks integrate via SDK in minutes).

Ecosystems:
ESM
Use Cases:
walletsdefiinfrastructure+4

Openness

Project Phase
MAINNET
Project Launch Day
FEB 28TH, 2025
Assets Used
ETHUSDCUSDTOTHERBTC
Native Token
NOT AVAILABLE

Technology

Open Source
Yes
Decentralized Storage
No
Upgradability
Yes
Peer to Peer (P2P)
Supported
Asset Custodynon-custody
Technology Type
No data available

Privacy
Enabled by default

Know Your Customer (KYC)
Not Required
Privacy Policy
ComplianceCurvy is designed to be compatible with regulatory requirements (e.g., OFAC / AML frameworks) through selective disclosure, auditability, and partner-level compliance controls, while the base protocol remains permissionless and non-custodial.
Sign-in Requirements
walletemailseedprivatekey
Collected DataWallet address (public interaction layer), transaction metadata required for execution, optional encrypted off-chain communication data. No collection of IP, location, or personal identity data at the protocol level.
Data UsageExecution of transactions and protocol functionality only (e.g., routing, validation, security, and performance monitoring). No reselling of user data; optional data use may occur at the application or integration layer depending on partners.

Security

Technical Dependency
Not available
Social Dependency
Not available
Third-party DependencyLi.Fi is used for bridging.