
Encrypted by Design
Confidential Finance · Encrypted AI · Privacy-Native DeSci · Sovereign Applications
Not privacy as a feature. Privacy as the execution model.
← Drag to compare →
⚠ All balances, recipients, and amounts visible to front-runners, MEV bots, and competitors
✓ Balances, recipients, and amounts encrypted. Only authorized parties can decrypt.
Applications
AppConfidential Finance · Encrypted AI · Privacy-Native DeSci · Sovereign Applications — a new class of dApps built on encrypted execution rather than transparent state.
FHE Execution
Off-ChainHeavy encrypted computation executes off-chain. Logic runs directly on encrypted balances, data, and application state — without ever exposing plaintext information to validators, executors, or observers.
Commitments · Nullifiers · Merkle State
On-ChainMaintain deterministic state integrity, prevent double-spends, and anchor encrypted execution back to verifiable on-chain settlement. The chain knows a note exists without seeing its contents.
Zero-Knowledge Verification
On-ChainEvery encrypted state transition emits a ZK proof. The chain verifies that computation was performed correctly — without revealing the underlying data, inputs, or intermediate state.
Settlement Layer
On-ChainThe chain serves as the canonical verification and settlement layer. Base and Ethereum live today; every EVM chain becomes a viable host for encrypted execution.
HOW IT WORKS
Encrypt
Users encrypt data client-side. Ciphertexts are submitted as transactions — no plaintext ever touches the chain.
Compute
The FHE coprocessor executes smart contract operations directly on encrypted data. State remains hidden throughout.
Verify
ZK proofs validate that computation was performed correctly — no one needs to see the data to confirm the result.
Decrypt
Only authorized parties decrypt results via threshold ceremony. Selective disclosure keeps you compliant.
FHE Mixer
Variable-amount mixing with an encrypted audit trail. No fixed denominations, no destroyed records. Privacy that's compliance-ready.
Learn moreFHE Bridge
Encrypted cross-chain transfers with cryptographic solvency proofs. Amounts and destinations stay private across chains.
Learn morePrivacy Primitives
Building blocks for confidential dApps — encrypted balances, private governance, sealed-bid auctions, and more.
Learn more
Confidential Finance
Private payments and confidential DeFi are the most immediate use cases. Users transact, lend, trade, or interact with smart contracts without exposing balances, wallet activity, positions, or transaction history publicly on-chain — while still maintaining cryptographic verifiability and double-spend protection.
- Private payments & encrypted balances
- Institutional DeFi & dark liquidity
- Confidential lending and trading
Encrypted AI
Models and agents process encrypted user data without ever decrypting it publicly. AI runs over ciphertext — never exposing inputs, outputs, prompts, or state. Confidential inference, encrypted autonomous agents, privacy-preserving analytics, and secure enterprise computation where sensitive data never leaves encrypted form.
- Confidential AI inference
- Encrypted autonomous agents
- Privacy-preserving analytics & enterprise compute
Privacy-Native DeSci
Scientific and biomedical data is extremely valuable, sensitive, and difficult to share openly. Veilnet lets researchers, labs, AI models, and institutions analyze encrypted genomic, clinical, pharmaceutical, or biomarker data without exposing the raw underlying information — replacing the false choice between "private but unusable" and "open but exposed."
- Privacy-preserving biomedical AI
- Decentralized clinical studies
- Confidential pharmaceutical modeling
- Secure monetization of scientific datasets
Sovereign Applications
Encrypted smart contract applications for sectors where privacy is critical. Instead of blockchains exposing all state publicly by default, applications execute over encrypted state while remaining verifiable through ZK proofs, commitments, nullifiers, and deterministic settlement logic.
- Healthcare · Identity · Enterprise Coordination
- Defense · Prediction Markets · Governance
- Institutional Finance · Encrypted Digital Economies
Two frontiers transparent chains structurally cannot serve — encrypted execution makes them viable.
Compute on genomes, clinical records, and pharma data — without ever decrypting them.
Scientific and biomedical data is the most valuable, sensitive, and under-shared dataset on earth. Veilnet replaces the false choice between 'private but unusable' and 'open but exposed' with encrypted yet verifiable scientific computation — coordinated globally without sacrificing confidentiality, compliance, or ownership.
- Researchers, labs, and AI models analyze encrypted genomic, clinical, pharmaceutical, and biomarker data — raw plaintext never leaves the user's control.
- Privacy-preserving biomedical AI, decentralized clinical studies, and confidential pharmaceutical modeling, all anchored on-chain via ZK proofs.
- Secure monetization of scientific datasets — users retain ownership, compute permissions are granted, plaintext is never exposed.
AI agents and models that operate on encrypted prompts, weights, and outputs.
Today's AI exposes every input, output, and intermediate state. Veilnet lets models and agents run forward passes directly on ciphertext — confidential inference where the model never sees plaintext, and the user never reveals the question.
- Encrypted autonomous agents trade, lend, and execute on-chain strategies without leaking positions, balances, or signals to MEV bots or competitors.
- Confidential AI inference for enterprises — sensitive prompts and proprietary data stay encrypted end-to-end, with cryptographic proof of correct execution.
- Privacy-preserving analytics and encrypted compute marketplaces where inputs, outputs, prompts, and state remain sealed.
COMPARISON
| Feature | VeilnetFHE + ZK | Pure FHEFhenix, Zama | Pure ZKAztec, Railgun | MPCMulti-Party | TEESGX, TrustZone |
|---|---|---|---|---|---|
| Encrypted Computation | |||||
| Verifiable Correctness | |||||
| No Hardware Trust | |||||
| EVM Compatible | |||||
| Composable | |||||
| Compliance-Ready |
Scroll to compare →
Veilnet is building the execution layer for that future.
The infrastructure layer for private intelligence.