Veilnet
The Encrypted Execution Layer

Encrypted by Design

Confidential Finance · Encrypted AI · Privacy-Native DeSci · Sovereign Applications

Not privacy as a feature. Privacy as the execution model.

← Drag to compare →

Exposed — All Data Visible
From → ToAmount
0x7a3f...b2c10xd4e2...9f8a142.50 ETH
0x1b2c...e3d40x8f7a...c6b589.20 ETH
0xa9b8...7c6d0x3e4f...2a1b267.80 ETH
0x5d6e...4f3a0xc1d2...8e7f53.10 ETH

⚠ All balances, recipients, and amounts visible to front-runners, MEV bots, and competitors

Encrypted — Veilnet Protected
From → ToAmount
████████████ → ██████████████████████
████████████ → ██████████████████████
████████████ → ██████████████████████
████████████ → ██████████████████████
FHE + ZK PROTECTED

✓ Balances, recipients, and amounts encrypted. Only authorized parties can decrypt.

Exposed
Encrypted
Architecture

Applications

App

Confidential Finance · Encrypted AI · Privacy-Native DeSci · Sovereign Applications — a new class of dApps built on encrypted execution rather than transparent state.

FHE Execution

Off-Chain

Heavy encrypted computation executes off-chain. Logic runs directly on encrypted balances, data, and application state — without ever exposing plaintext information to validators, executors, or observers.

Commitments · Nullifiers · Merkle State

On-Chain

Maintain deterministic state integrity, prevent double-spends, and anchor encrypted execution back to verifiable on-chain settlement. The chain knows a note exists without seeing its contents.

Zero-Knowledge Verification

On-Chain

Every encrypted state transition emits a ZK proof. The chain verifies that computation was performed correctly — without revealing the underlying data, inputs, or intermediate state.

Settlement Layer

On-Chain

The chain serves as the canonical verification and settlement layer. Base and Ethereum live today; every EVM chain becomes a viable host for encrypted execution.

Encrypted by Default · Verifiable by Design

HOW IT WORKS

01

Encrypt

Users encrypt data client-side. Ciphertexts are submitted as transactions — no plaintext ever touches the chain.

02

Compute

The FHE coprocessor executes smart contract operations directly on encrypted data. State remains hidden throughout.

03

Verify

ZK proofs validate that computation was performed correctly — no one needs to see the data to confirm the result.

04

Decrypt

Only authorized parties decrypt results via threshold ceremony. Selective disclosure keeps you compliant.

Products

Privacy

FHE Mixer

Variable-amount mixing with an encrypted audit trail. No fixed denominations, no destroyed records. Privacy that's compliance-ready.

Learn more
Interop

FHE Bridge

Encrypted cross-chain transfers with cryptographic solvency proofs. Amounts and destinations stay private across chains.

Learn more
Infra

Privacy Primitives

Building blocks for confidential dApps — encrypted balances, private governance, sealed-bid auctions, and more.

Learn more
What Veilnet Enables

Confidential Finance

Private payments and confidential DeFi are the most immediate use cases. Users transact, lend, trade, or interact with smart contracts without exposing balances, wallet activity, positions, or transaction history publicly on-chain — while still maintaining cryptographic verifiability and double-spend protection.

  • Private payments & encrypted balances
  • Institutional DeFi & dark liquidity
  • Confidential lending and trading

Encrypted AI

Models and agents process encrypted user data without ever decrypting it publicly. AI runs over ciphertext — never exposing inputs, outputs, prompts, or state. Confidential inference, encrypted autonomous agents, privacy-preserving analytics, and secure enterprise computation where sensitive data never leaves encrypted form.

  • Confidential AI inference
  • Encrypted autonomous agents
  • Privacy-preserving analytics & enterprise compute

Privacy-Native DeSci

Scientific and biomedical data is extremely valuable, sensitive, and difficult to share openly. Veilnet lets researchers, labs, AI models, and institutions analyze encrypted genomic, clinical, pharmaceutical, or biomarker data without exposing the raw underlying information — replacing the false choice between "private but unusable" and "open but exposed."

  • Privacy-preserving biomedical AI
  • Decentralized clinical studies
  • Confidential pharmaceutical modeling
  • Secure monetization of scientific datasets

Sovereign Applications

Encrypted smart contract applications for sectors where privacy is critical. Instead of blockchains exposing all state publicly by default, applications execute over encrypted state while remaining verifiable through ZK proofs, commitments, nullifiers, and deterministic settlement logic.

  • Healthcare · Identity · Enterprise Coordination
  • Defense · Prediction Markets · Governance
  • Institutional Finance · Encrypted Digital Economies
Spotlight

Two frontiers transparent chains structurally cannot serve — encrypted execution makes them viable.

Encrypted Research Pipeline
FHE · Live
Genomic
Clinical
Pharma
Biomarker
FHE
Compute
Verifiable
4 Sources → 1 Encrypted Computation → ZK-Verified OutputRaw data never decrypted
DeSci

Compute on genomes, clinical records, and pharma data — without ever decrypting them.

Scientific and biomedical data is the most valuable, sensitive, and under-shared dataset on earth. Veilnet replaces the false choice between 'private but unusable' and 'open but exposed' with encrypted yet verifiable scientific computation — coordinated globally without sacrificing confidentiality, compliance, or ownership.

  • Researchers, labs, and AI models analyze encrypted genomic, clinical, pharmaceutical, and biomarker data — raw plaintext never leaves the user's control.
  • Privacy-preserving biomedical AI, decentralized clinical studies, and confidential pharmaceutical modeling, all anchored on-chain via ZK proofs.
  • Secure monetization of scientific datasets — users retain ownership, compute permissions are granted, plaintext is never exposed.
Encrypted Inference
Agent · Live
Prompt
->■▒■▒◆#■▒▌*+◇-=@
$▐$*$#▓>▓□&=
▌#+□▓*+%-▐░_■□◆*▓◇■▒
ciphertext · 8KB
FHE Model
forward pass on ciphertext
Output
◆▐!_●○<=@%▓█-▒
▓#▌○!>@○◆_$▐●#+▒+□
+_●▒▌▒■_░▒!□
ciphertext · only user decrypts
User
Agent · Encrypted Weights
User
Encrypted in · Encrypted compute · Encrypted outModel never sees plaintext
DeFAI · Encrypted AI

AI agents and models that operate on encrypted prompts, weights, and outputs.

Today's AI exposes every input, output, and intermediate state. Veilnet lets models and agents run forward passes directly on ciphertext — confidential inference where the model never sees plaintext, and the user never reveals the question.

  • Encrypted autonomous agents trade, lend, and execute on-chain strategies without leaking positions, balances, or signals to MEV bots or competitors.
  • Confidential AI inference for enterprises — sensitive prompts and proprietary data stay encrypted end-to-end, with cryptographic proof of correct execution.
  • Privacy-preserving analytics and encrypted compute marketplaces where inputs, outputs, prompts, and state remain sealed.
Chain Support

BaseLive
EthereumLive
ArbitrumComing Soon
OptimismComing Soon
PolygonComing Soon

COMPARISON

FeatureVeilnetFHE + ZKPure FHEFhenix, ZamaPure ZKAztec, RailgunMPCMulti-PartyTEESGX, TrustZone
Encrypted Computation
Verifiable Correctness
No Hardware Trust
EVM Compatible
Composable
Compliance-Ready

Scroll to compare →

Why It Matters

Veilnet is building the execution layer for that future.

Encrypted computation.
Verifiable execution.
Trustless settlement.

The infrastructure layer for private intelligence.

FAQ