Getting Started
This section describes how participants establish cryptographic authority and execution control within the Quantova Network. It explains the account model used by Quantova, the mechanisms through which transactions and programs are authorized, and how identity and control are expressed at the protocol level rather than through intermediaries.
Quantova accounts function as execution principals within the network. They define who may authorize state changes, initiate transactions, and interact with on chain systems governed by the Quantova Virtual Machine QVM. Control is exercised through cryptographic keys and protocol enforced permissioning, not through custodial arrangements or centralized account administration.
Guides in this section include
- How to create a Quantova account This guide explains how accounts are instantiated within Quantova’s execution environment, including the generation and control of cryptographic keys, the scope of authorization associated with those keys, and how accounts are recognized by the network for transaction validation and state transitions. It also outlines the distinction between externally controlled accounts and programmatic accounts under QVM.
- How to use a wallet This guide describes how wallets interact with Quantova accounts to submit execution requests, authorize asset movement, and interface with applications deployed on QVM. It focuses on how transactions are constructed, signed, and validated by the network, and how wallets function as key management and authorization tools rather than custodial service providers.
Security Fundamentals
This section explains how Quantova enforces execution safety at the protocol level and how participants can directly manage permissions associated with their accounts. Security within Quantova is based on deterministic execution, explicit authorization, and transparent state transitions, rather than reliance on trust in application operators or off chain assurances.
Participants retain continuous control over which programs may execute actions on their behalf. Permissions are explicit, inspectable, and revocable through on chain mechanisms governed by QVM.
Guides in this section include
- How to revoke smart contract execution access This guide explains how users can review and withdraw execution permissions previously granted to applications or contracts. It details how authorization scopes are defined, how revocation is enforced by the virtual machine, and how participants can maintain asset control without requiring cooperation from application operators.
- How to identify malicious or misleading assets This guide outlines practical methods for evaluating assets and execution requests prior to authorization. It focuses on inspecting contract behavior, understanding execution consequences, and recognizing patterns associated with misleading representations or unintended state changes. Quantova does not label, certify, or approve assets.
Operating on Quantova
This section covers the core operational capabilities enabled by Quantova’s execution and settlement architecture. It explains how value and state are transferred across systems using protocol level primitives, without reliance on application specific routing, custodial handling, or discretionary intervention.
The emphasis is on how transactions are validated, executed, and finalized by the network, and how interoperability is achieved through deterministic execution rather than centralized coordination.
Guides in this section include
- How to bridge assets across the Quantova network This guide describes how assets may be moved across networks using decentralized execution and settlement mechanisms. It explains how bridging logic is enforced at the protocol or contract level, how authorization is preserved throughout the process, and the risks associated with cross network state synchronization.
- How to exchange assets on Quantova This guide explains how on chain asset exchange operates through applications deployed on QVM. It focuses on execution flow, liquidity mechanics, and settlement behavior, while clarifying that pricing, availability, and exchange conditions are defined by third party applications rather than by the Quantova protocol.
QVM Native Execution Model
This section provides a detailed explanation of the Quantova Virtual Machine QVM, the deterministic execution environment that governs all on chain activity. It explains how transaction validity, authorization, and state transitions are enforced directly at the virtual machine layer.
Execution outcomes are consistent across validating nodes and independent of off chain interpretation or discretionary enforcement. This execution model supports auditability, predictable system behavior, and legal interpretation of state changes for institutional and public sector participants.
This resource provides an in depth examination of QVM execution semantics, authorization models, and governance boundaries, intended for developers, auditors, and supervisory stakeholders requiring detailed technical context.