Locate Protocol Lifecycle
Last updated: 2026-03-01
This diagram shows the end-to-end lifecycle of a Scintilla Locate presence claim — from private observation to settlement on Flare and dispute-grade verification.
Notes
- Privacy boundary: raw coordinates remain private; the system publishes proofs and commitments instead of location histories.
- Determinism boundary: canonical encodings and deterministic ordering make verification reproducible years later.
- Economic security: rounds are constrained by the security envelope; disputes can trigger slashing under governance rules.