# Burnr Tech Use cases

## 🧪 Use Case 1: Secure Key Transmission in Trust-Minimized Environments

### Problem Space

In decentralized ecosystems, private key management is both mission-critical and notoriously fragile. Whether rotating multisig signers, distributing validator keys, or handing over a smart contract’s deployer wallet, there’s a recurring need to transmit cryptographic secrets securely between actors in **trust-minimized**, **non-custodial** contexts.

Traditional solutions—PGP, air-gapped QR handovers, ephemeral chat platforms—fail in at least one of three dimensions: ease, auditability, or deniability.

### Burnr's Value Proposition

Burnr provides a **single-use, encrypted, and fully client-side delivery mechanism** for key material that self-destructs on access. Its ephemeral design removes the attack surface exposed by apps that retain session logs or backup histories.

#### Key Features Supporting This Use Case

* **Client-side encryption (AES-256 + RSA hybrid model)** ensures payloads are unreadable in transit and at rest—even to Burnr itself.
* **Burn-on-read logic** is enforced via hash-validated callbacks on serverless infrastructure, reducing persistent state risks.
* **Zero storage fallback:** If the recipient fails to open the message before expiry, the data is irreversibly lost—mirroring real-world "Shamir's burn notes."

### Example Applications

* Rotating signer keys in **Cosmos-based chains**, where validator handoffs require cross-team communication.
* Delivering **multi-sig wallet seed phrases (e.g., Gnosis Safe owners)** to globally distributed co-signers.
* Transmitting **founder wallet recovery phrases** during early-stage team expansions or mergers.
* Controlled one-time share of **zk-SNARK proving keys** in L2 sequencer environments.

### Threat Model Resilience

| Threat            | Mitigation via Burnr                                       |
| ----------------- | ---------------------------------------------------------- |
| Intercepted Link  | Requires decryption key, optional passphrase               |
| Server compromise | No readable content stored; client-encrypted               |
| Insider leak      | Link expires post-burn; no replay vector                   |
| Forensic recovery | Burnr uses memory-only processing (non-persistent backend) |

By incorporating Burnr, dApps, DAOs, and node operators can harden operational security without introducing friction, vendor lock-in, or centralized dependencies.

***

## 🧩 Use Case 2: Off-Chain Encrypted Governance Signaling & DAO Coordination

### Problem Space

DAOs often struggle with maintaining **confidentiality in pre-vote coordination**, **private signaling**, or **consensus-building around sensitive initiatives**. While on-chain votes are transparent by design, early-stage discussions around security patches, treasury reallocations, or multisig rotations often require **off-chain, trust-gated environments**.

This leads to a tension between **transparency** and **operational security**.

### Burnr as a DAO-Ready Signal Layer

Burnr introduces a novel pattern: **"off-chain encrypted ephemeral governance signaling"**. Using Burnr links, DAO contributors can circulate:

* **Time-bound encrypted votes**
* **One-time coordination instructions**
* **Private consensus logs**

All of these vanish after viewing—leaving no plaintext chat history or extractable signal.

#### Technical Alignment with DAO Ops

* **Integrates with wallet-authenticated access**: Burnr links can be paired with wallet-only decryption via off-the-shelf E2EE libraries (e.g., WebCrypto + SIWE authentication).
* **Enables off-chain quorum simulation**: Before on-chain proposals go live, Burnr links simulate sentiment checks or sensitive strategy reveals.
* **Doubles as a fallback secure channel** when DAO tooling (e.g., Snapshot, Tally) lacks privacy layers.

#### Practical Scenarios

* Sharing **exploit discovery reports** to core contributors before full disclosure.
* Circulating **emergency redemption plans** for treasury assets prior to public announcement.
* Enabling **stealth coordination for migration** to new governance frameworks (e.g., Compound to GovernorBravo upgrades).

### Crypto-Native Advantages

* **Non-custodial**: No wallet connection needed to send/receive messages, preventing honeypot centralization.
* **Composable UX**: Burnr links can be embedded in gated Discord bots, governance dashboards, or off-chain coordination tools.
* **No Sybil risk**: Access is ephemeral and non-incentivized—no replay or farming vectors.
