Sundial Logo
Sundial Logo

Built on Bitcoin's Ledger Model

Sundial leverages a UTXO architecture to deliver institutional-grade security, deterministic execution, and fraud-proof protection for Bitcoin yield generation

Layer 2 Architecture

A multi-layer approach to scaling Bitcoin while maintaining Layer 1 security guarantees

Bitcoin Layer 1

Native Bitcoin blockchain providing ultimate security and finality. Assets never leave user custody.

Bridge Infrastructure

Trustless ZK-powered bridges enabling seamless asset movement between Bitcoin and Sundial without custodial risk.

Sundial Layer 2

Optimistic rollup with fraud proofs, processing thousands of transactions per second with Bitcoin-level security.

Application Layer

DeFi protocols, institutional services, and SDK integrations built on Sundial's secure infrastructure.

Core Technology Features

Purpose-built for institutional Bitcoin infrastructure

UTXO Architecture

Inherits Bitcoin's battle-tested security model with deterministic execution and no shared state vulnerabilities.

Fraud Proofs

Optimistic rollup design with efficient on-chain verification ensures invalid transactions never finalize.

High Throughput

Process thousands of transactions per second while maintaining sub-second confirmation times.

ZK Bridges

Zero-knowledge proofs enable trustless asset transfers without introducing custodial risk.

Babel Fees

Pay transaction fees in BTC, ADA, or any supported asset - no need to hold multiple tokens.

Full Auditability

Complete transaction history and state transitions verifiable on-chain for regulatory compliance.

Security Comparison

Why UTXO architecture provides superior security for institutional assets

UTXO Model

  • Stateless execution - no shared memory
  • Deterministic outcomes guaranteed
  • No reentrancy attacks possible
  • Parallel transaction processing
  • True self-custody maintained
  • Audit trail permanently recorded

Account Model

  • Shared global state vulnerabilities
  • Non-deterministic execution paths
  • Reentrancy attack vectors
  • Sequential processing bottlenecks
  • Contract custody requirements
  • Complex state verification
Check Point
BitLayer
Input Output
BitcoinOS
Anastasia Labs

Trusted by Leading Infrastructure Partners