zPass docs
  • zPass
    • Introduction
    • Quickstart
    • Background
    • Benefits & Use Cases
    • Technical Foundations
    • System Participants
    • Powered by Aleo
  • Fundamentals
    • Issuer
    • Holder
    • Verifier
    • Off-chain flow
    • On-chain flow
    • Local Execution with WASM
  • ZPass Programs
    • Background
    • Verify offchain program
    • zPass issuance program
    • zPass hiding program
    • zPass invalidate program
    • zPass invalidate hiding program
    • zPass merkle tree size 8 program
  • ZPass SDK
    • Methods References
      • constructor
      • setNewHost
      • issueZPass
      • getZPassRecord
      • proveOnChain
      • proveOffChain
      • verifyOnChain
      • verifyOffChain
      • signCredential
      • initThreadPool
      • createAleoWorker
      • getMerkleRoot
      • getMerkleTree
      • getMerkleProof
      • getLeavesHashes
      • signMerkleRoot
  • Example Usage
    • Step-by-step Guide
Powered by GitBook
On this page
  1. Fundamentals

Local Execution with WASM

Local Execution with WASM

WebAssembly (WASM) is integral to zPass, designed to maximize user security and data control. Using WASM for client-side data processing, zPass eliminates unnecessary data transfers, reducing exposure risks.

Localized data processing

Utilizing WASM, zPass can execute pre-compiled programs directly on the user's device, thus retaining sensitive information within a local environment. This localized approach mitigates the risk of data exposure through network interceptions or server vulnerabilities, ensuring that user data never leaves the client side unless explicitly intended.

Trustless ecosystem

The architecture creates a trustless computing ecosystem. It minimizes dependency on third-party servers or intermediaries for data processing, thereby conferring users greater control and assurance over their data. This is especially important for maintaining data integrity and confidentiality.

Security advantages

WASM is engineered to enforce the same-origin and permissions security policies of the browser, which makes it an apt choice for secure, controlled execution of code. zPass leverages these inherent security features to establish a secure execution environment for user-specific applications.

PreviousOn-chain flowNextBackground

Last updated 4 months ago