Layer 01
Shielded Pools
Shared liquidity pools where deposits become commitments, not explicit balances. Nullifiers prevent double-spends while preserving anonymity sets across many users and strategies.
Privacy Backroom is a zero-knowledge powered infrastructure that lets users and autonomous agents move value inside a private “backroom” while preserving on-chain verifiability.
Instead of streaming every interaction directly onto a public ledger, flows are shielded inside a dedicated backroom state. Deposits enter, actions are executed off-graph, and exits are proven with succinct zk-proofs that confirm correctness without exposing who did what.
How It Works
The backroom behaves like a shielded execution zone. Users move assets into a shared pool, operate inside a private state, and finalize with proofs that keep the public ledger honest without leaking sensitive details.
The result: a verifiable system where correctness is public, but strategy, flow patterns, and identity remain sealed inside the backroom.
Core Components
Under the hood, Privacy Backroom is a composition of cryptographic tooling and routing infrastructure tuned for high-signal, privacy-preserving settlement.
Layer 01
Shared liquidity pools where deposits become commitments, not explicit balances. Nullifiers prevent double-spends while preserving anonymity sets across many users and strategies.
Layer 02
Circuits that enforce conservation of value, path correctness, and pool integrity. Every internal move is accompanied by a proof that can be verified cheaply on-chain.
Layer 03
Permissionless relayers that submit final transactions, pay gas, and shield the original source of activity. Users can rotate relayers or route through multiple to break linkability.
Who It Serves
Privacy Backroom is not just a wallet feature. It is an execution environment for entities that treat privacy and strategy protection as core requirements.
Users who want to separate their identity from their on-chain behavior without giving up the benefits of programmable money.
Organizations and autonomous agents that need to execute complex strategies without leaking intent, inventory, or routing logic.