Skip to main content

AML, KYC & KYB

POTLOCK is committed to a compliance-minded approach. This page describes our stance on anti-money laundering (AML), Know Your Customer (KYC), and Know Your Business (KYB) in the context of our open, permissionless protocol and the applications built on top of it.

Anti-Money Laundering (AML)

POTLOCK is compliance-minded. Our smart contracts are locked and permissionless: anyone can use them to send and receive value. At the protocol level we do not have backdoors—we cannot freeze, reverse, or block transactions. We can only build front ends that may implement screening (e.g. sanctions screening, risk controls, or other compliance measures). Compliance efforts therefore focus on the application layer and on the ecosystem of participants who build on top of the protocol.

  • Contracts are locked and audited; no single party can alter or halt protocol-level transfers.
  • Front ends we operate or support may apply screening and compliance controls where legally and technically feasible.
  • Third parties who integrate or build on the protocol may implement their own AML and screening policies.

KYC & KYB

Know Your Customer (KYC) and Know Your Business (KYB) are not enforced at the protocol level. They may be implemented by front-end operators, gateways, or third parties who build on top of the protocol. Users may encounter KYC or KYB when using certain applications or portals in the ecosystem.

POTLOCK does not operate a central KYC or KYB service. Such requirements depend on the specific application, gateway, or partner. Projects and funders building on the protocol may choose to integrate KYC/KYB through their own front ends or through third-party providers as part of their compliance and risk framework.

Summary

  • We are compliance-minded; our contracts are locked and anyone can use them to send and receive.
  • At protocol level we have no backdoors—screening and controls are implemented at the front end and by ecosystem applications.
  • KYC and KYB are applied by the applications and portals built on top of the protocol, not by the protocol itself.