| Description | |
|---|---|
| Hop | Number of hops the risk propagates |
| Threshold Amount | The sensitivity level between two points. This amount is used for risk propagation from A only when total transfers between A and B exceed the threshold amount. |
| Categories | The categories to include in the detection |
| Transaction History | The time range of transactions used to calculate the risk model, by default full range (recommended) |
| Feedback Signal | Customer’s own whitelist and blacklist, customer’s own address list, known entities etc |
Each organization is assigned at least one risk model configuration. This configuration periodically generates a risk model by analyzing the latest evolution of onchain transaction graph and offchain labels. Each version of the risk model is associated with a config revision, providing a linear audit trail for your compliance processes.
Notes:
<aside> 🦉
Legal Disclaimer:
The parameters presented herein are provided for informational purposes only and represent a subset of the broader configuration utilized by CipherOwl’s ECS Risk Model. CipherOwl reserves the right to modify, adjust, or enhance these parameters and the underlying methodologies at any time without prior notice. While CipherOwl endeavors to ensure optimal performance through rigorous testing, we do not guarantee that such modifications will achieve specific outcomes or meet particular performance criteria. Please be aware that additional internal parameters and configurations, not disclosed here, are integral to the model’s operation. CipherOwl makes no warranties or representations regarding the completeness, accuracy, or reliability of the information provided in this document. Users should not rely solely on the disclosed parameters for decision-making purposes.
</aside>
bc1pmaf6wahsk6957y3wkyhcyhpl6jqwu2399leu3lmg33w3u0gjateq4g8v48