# In-Voluntary Selective De-Anonymization (SeDe)

### In-Voluntary Selective De-Anonymization (SeDe) <a href="#in-voluntary-selective-de-anonymization-sede" id="in-voluntary-selective-de-anonymization-sede"></a>

Veilnyx maintains decentralization by distributing decision-making authority among multiple entities in the SeDe framework, including revokers and guardians, rather than relying on a single controlling party. You can learn more about Veilnyx compliance here.

\
The private keys of revokers and guardians are used together to de-anonymize transactions within the Veilnyx ecosystem in a decentralized and distributed manner.

### **Revoker’s responsibility**

#### Requests page

The de-anonymization process begins when a revoker submits a request. Guardians act as a safeguard against any unauthorized de-anonymization. A guardian ensures that de-anonymization only occurs when law enforcement provides a valid warrant or court order through a request raised on the Veilnyx compliance network. Without proper legal authorization, guardians reject the request, protecting user privacy.

<figure><img src="https://1310074946-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfuRJzJ8cEqekSVBqpKIH%2Fuploads%2FqoXUL6LIZgJXsJnyN6O8%2FScreenshot%202026-01-12%20at%203.56.21%E2%80%AFPM.png?alt=media&#x26;token=ccfe105d-d203-422f-80a6-3e01db813551" alt=""><figcaption><p>Requests</p></figcaption></figure>

#### **Guardian’s responsibility**

After the revoker creates a request, the guardians review it and cast their votes to determine whether the transaction should be de-anonymized. Once enough guardians approve the request and the threshold is met, they provide cryptographic permission through the “Give Permission” action in the interface, allowing the revoker to proceed.\
De-anonymization is then performed by the revoker using the “Decrypt” action in the interface. After the required cryptographic checks are completed in the background, the revoker can view the de-anonymized transaction details, including the stealth address, asset type, and asset value.

{% file src="<https://1310074946-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfuRJzJ8cEqekSVBqpKIH%2Fuploads%2FAgNSgCyUsoWf1wT7EZU9%2Fraise%20request%20and%20de-anonymise%20tx.mp4?alt=media&token=b0938d33-13af-427d-83aa-3861d161a951>" %}

### **Normal user view**

Normal users who are not revokers or guardians can only access transaction history from the homepage of Decom. Normal users or guardians don’t have access to de-anonymised transactions.

<figure><img src="https://1310074946-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfuRJzJ8cEqekSVBqpKIH%2Fuploads%2FEzGW7gZJ7mwN2tEfFDiM%2FScreenshot%202026-01-12%20at%203.53.12%E2%80%AFPM.png?alt=media&#x26;token=bbcab73c-9e84-4b94-8a2a-ebb07d4ee392" alt=""><figcaption><p>Transactions</p></figcaption></figure>

### **Compliance actors list**

<figure><img src="https://1310074946-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfuRJzJ8cEqekSVBqpKIH%2Fuploads%2FW4VJ5yxHMt7JtOFB5nBa%2FScreenshot%202026-01-12%20at%203.53.27%E2%80%AFPM.png?alt=media&#x26;token=c276ba7a-ca6b-490d-aba9-20d7f4ed4d23" alt=""><figcaption></figcaption></figure>
