Skip to main content
Privacy Boost adds a confidential transfer layer to any EVM chain. Deposit, transfer, and withdraw ERC-20 tokens with amounts, counterparties, and balances fully hidden onchain.

Protocol Deep Dive

Understand the protocol, cryptographic foundations, and architecture

Start Building

Integrate private payments into your app with our multi-platform SDKs

Why Privacy Matters

On public blockchains, every transfer, every balance, and every counterparty relationship is visible to anyone. For applications handling real financial flows, this creates immediate business, competitive, and regulatory risk.

Wallets

User balances and transaction history must remain private — not broadcast onchain.

Stablecoin Networks

Payment and settlement flows require confidentiality between counterparties.

RWA Platforms

Institutional positions and counterparty identities are commercially sensitive.

Fintech Applications

Privacy must align with financial regulatory frameworks, not conflict with them.

Why Privacy Boost?

Sub-500ms Transactions

Server-side ZK proof generation inside a hardware-isolated enclave. No client-side proving — works instantly on any device, including mobile.

1,800+ TPS

Proof aggregation batches hundreds of transfers into a single onchain transaction, reducing gas costs by orders of magnitude.

Auditability

Authorized auditors can query specific accounts. Every audit access is logged immutably onchain. Privacy for users, accountability for regulators.

True Self-Custody

Your keys, your funds. Forced withdrawal lets you exit directly through the smart contract — even if every server goes offline permanently.

Instant Balances & History

A TEE-secured indexer decrypts and serves your balance and transaction history in real time. No blockchain scanning required.

Drop-In Integration

Works with MetaMask, WalletConnect, and any EOA. TypeScript, React, CLI, and Rust SDKs — with iOS, Android, and React Native coming soon. No new wallet software needed.

Demo

Demo video coming soon. Try the live app →

How It Works

User journey: request flow from User through TEE Server to Smart Contract, with TEE Indexer serving balances back 1. Deposit — Tokens move from a public wallet into the privacy layer and become encrypted private notes. 2. Transfer Request — The user signs a transfer with their spending keys and submits it to the TEE Prover. 3. ZK Proof Generation — The TEE generates a zero-knowledge proof in ~500ms while enforcing regulatory rules. 4. Onchain Verification — The smart contract verifies the proof and records the result. Amounts, balances, and counterparties remain hidden. 5. Encrypted State Indexing — The TEE Indexer reads onchain state and indexes encrypted metadata, giving sender and recipient instant access to their balances and history. 6. Auditability — When required, authorized auditors can query specific accounts’ balances and history through a scoped disclosure mechanism. Every query is logged immutably onchain.

Why ZK + TEE?

Most privacy protocols force a tradeoff: client-side proving is trustless but costs 5–30+ seconds per transaction, can’t serve balance queries, and has no auditability. Privacy Boost combines both:
  • ZK proofs provide the privacy guarantees — sender, recipient, amounts, and token types are all hidden onchain. The smart contract verifies every proof and holds all funds. This is the cryptographic foundation.
  • TEE handles what ZK alone can’t deliver: sub-500ms proof generation, instant balance and transaction history queries, and auditability through scoped audit access — all inside a hardware-isolated enclave.
The result: a privacy protocol with the speed and UX of a centralized system, the trustlessness of ZK, and the custody guarantees of a smart contract. Self-custody is unconditional. Even if the TEE goes offline permanently, users exit directly through the smart contract via forced withdrawal — using only their own keys and public onchain data.

Trust & Security Model

How the TEE works, what it can and can’t see, forced withdrawal, and the full threat model

Explore the Docs

Trust & Security

TEE guarantees, self-custody, forced withdrawal, and threat model

Compliance & Auditing

How auditors query data with onchain accountability

Protocol Deep Dive

UTXO model, notes, nullifiers, Merkle trees, transaction lifecycle

Keys & Encryption

Key hierarchy, dual-path ECDH encryption, privacy addresses