Menu

Privacy by Cryptographic Proof

Ludopoly's approach to privacy is architecturally different from conventional games. In a standard online game, the server knows every player's position and must be trusted to withhold that information from rivals. In Ludopoly, the server never knows your position at all. Your location is stored on-chain only as a cryptographic hash — a Poseidon commitment computed from your country identifier and a secret that exists solely on your device. Without your secret, no hash can be reversed.

What Zero-Knowledge Proofs Achieve

When you move from one country to another, your application generates a zero-knowledge proof that certifies three things simultaneously: that your claimed starting position matches what the blockchain has recorded, that your destination is a valid country within the permitted travel distance, and that this specific move has not been submitted before. The proof provides all of this assurance without revealing either your starting country or your destination country to anyone observing the chain.

The Information Landscape

The distinction between public and private information in Ludopoly is precise. What any observer can read from the blockchain is the hash of each player's current position and the sequence of hashes from their recent moves. What no observer can derive from those hashes — unless they possess the player's private secret — is the actual country behind any of them. The gap between observable hash sequences and knowable positions is the fog of war, and it is enforced mathematically rather than by policy.

Client-Side Computation

Every privacy guarantee in Ludopoly is computed on your device. The proof is generated locally from inputs that never leave your browser or application. The blockchain receives the proof and public signals but never the private inputs. This architecture means that a server compromise, a network interception, or an oracle malfunction cannot expose your position, because your position was never transmitted in a readable form.

Strategic Implications

Cards in the Reconnaissance category interact with the fog of war by temporarily surfacing hash values that opponents can attempt to decode. Decoding requires a brute-force search across all possible countries — computationally trivial but only possible when the player's secret is also known or set to a known value. Most opponent hashes remain opaque indefinitely unless a card forces a reveal under controlled conditions. Managing which hashes become visible, and when, is a central dimension of strategic play.