Skip to main content

Locate Protocol Lifecycle

Last updated: 2026-03-01

This diagram shows the end-to-end lifecycle of a Scintilla Locate presence claim — from private observation to settlement on Flare and dispute-grade verification.

Locate Protocol Lifecycle

Notes

  • Privacy boundary: raw coordinates remain private; the system publishes proofs and commitments instead of location histories.
  • Determinism boundary: canonical encodings and deterministic ordering make verification reproducible years later.
  • Economic security: rounds are constrained by the security envelope; disputes can trigger slashing under governance rules.