About Privacy Backroom ZK Backroom Layer

Private Settlement, Public Guarantees

Privacy Backroom is a zero-knowledge powered infrastructure that lets users and autonomous agents move value inside a private “backroom” while preserving on-chain verifiability.

Instead of streaming every interaction directly onto a public ledger, flows are shielded inside a dedicated backroom state. Deposits enter, actions are executed off-graph, and exits are proven with succinct zk-proofs that confirm correctness without exposing who did what.

  • Designed for advanced settlements, not just basic transfers.
  • Decouples user identity and behavior from their public addresses.
  • Protects from surveillance, data scraping, and MEV extraction.
  • Built to integrate with existing DeFi, dApps, and agent networks.
Design Goal
Backroom, Not Sidechain
The protocol behaves like a private corridor attached to existing chains, not a separate silo. Users can step into the backroom, perform actions, and step out while remaining anchored to the base network.
Security Model
Zero-Knowledge First
Every transition inside the backroom is backed by zk-proofs. External observers only see commitments, nullifiers, and proof verification events — never raw balances or linkable flows.
Settlement Focus
Swaps, Routes, Flows
Privacy Backroom is optimized for settlement-heavy activity: multi-hop swaps, portfolio rotations, streaming payouts, and agent-driven strategies that require consistent privacy guarantees.

How It Works

From Public Entry to Private Exit

The backroom behaves like a shielded execution zone. Users move assets into a shared pool, operate inside a private state, and finalize with proofs that keep the public ledger honest without leaking sensitive details.

01
Shielded Deposit
Users send funds into a shared shielded pool. A commitment is created and bound to a secret note that only the depositor can control. The public chain sees value entering the pool, but not who owns which deposit.
02
Private Backroom Actions
Inside the backroom, users perform actions such as swaps, rebalancing, or routing payments. Each action updates the private state and generates zk-proofs that attest to valid balance changes without revealing paths.
03
Relayer-Assisted Settlement
A relayer mesh broadcasts withdrawal and settlement transactions on behalf of users. Relayers see valid proofs, but not linkable information about the original deposits or the internal strategy.
04
Provable Exit
Assets exit the backroom back onto public chains with a non-traceable withdrawal. Observers can verify that the pool remains sound while still being unable to reconstruct who did what inside.

The result: a verifiable system where correctness is public, but strategy, flow patterns, and identity remain sealed inside the backroom.

Core Components

What Powers the Backroom

Under the hood, Privacy Backroom is a composition of cryptographic tooling and routing infrastructure tuned for high-signal, privacy-preserving settlement.

Layer 01

Shielded Pools

Shared liquidity pools where deposits become commitments, not explicit balances. Nullifiers prevent double-spends while preserving anonymity sets across many users and strategies.

Layer 02

ZK Proof Engine

Circuits that enforce conservation of value, path correctness, and pool integrity. Every internal move is accompanied by a proof that can be verified cheaply on-chain.

Layer 03

Relayer Mesh

Permissionless relayers that submit final transactions, pay gas, and shield the original source of activity. Users can rotate relayers or route through multiple to break linkability.

Who It Serves

Designed for High-Signal Users and Agents

Privacy Backroom is not just a wallet feature. It is an execution environment for entities that treat privacy and strategy protection as core requirements.

For Individuals and Power Users

Users who want to separate their identity from their on-chain behavior without giving up the benefits of programmable money.

  • Traders protecting execution patterns from copycats.
  • Users consolidating or rotating portfolios privately.
  • Contributors receiving payments without revealing full income graphs.

For Teams, Protocols, and Agents

Organizations and autonomous agents that need to execute complex strategies without leaking intent, inventory, or routing logic.

  • Market makers balancing inventory across venues.
  • Agent networks coordinating multi-step settlement flows.
  • Protocols that want private treasuries with public solvency proofs.