Skip to main content

14 posts tagged with "Privacy"

Privacy-preserving technologies and protocols

View all tags

Canton Network: How JPMorgan, Goldman Sachs, and 600 Institutions Built a $6 Trillion Privacy Blockchain Without Anyone Noticing

· 9 min read
Dora Noda
Software Engineer

While crypto Twitter debates memecoin launches and L2 gas fees, Wall Street has been running a blockchain network that processes more value than every public DeFi protocol combined. Canton Network — built by Digital Asset, backed by JPMorgan, Goldman Sachs, BNP Paribas, and DTCC — now handles over $6 trillion in tokenized real-world assets across more than 600 institutions. Daily transaction volume exceeds 500,000 operations.

Most of the crypto industry has never heard of it.

That is about to change. In January 2026, JPMorgan announced it will deploy its JPM Coin deposit token natively on Canton — making it the second blockchain (after Coinbase's Base) to host what is effectively institutional digital cash. DTCC is preparing to tokenize a subset of U.S. Treasury securities on Canton infrastructure. And Broadridge's distributed ledger repo platform, running on Canton rails, already processes $4 trillion monthly in overnight Treasury financing.

Canton is not a DeFi protocol. It is the financial system rebuilding itself on blockchain infrastructure — privately, compliantly, and at a scale that dwarfs anything in public crypto.

Why Wall Street Needs Its Own Blockchain

Traditional finance tried public blockchains first. JPMorgan experimented with Ethereum in 2016. Goldman Sachs explored various platforms. Every major bank ran a blockchain pilot between 2017 and 2022.

Almost all of them failed to reach production. The reasons were consistent: public blockchains expose transaction data to everyone, cannot enforce regulatory compliance at the protocol level, and force unrelated applications to compete for the same global throughput. A bank executing a $500 million repo transaction cannot share a mempool with NFT mints and arbitrage bots.

Canton solves these problems through an architecture that looks nothing like Ethereum or Solana.

Instead of a single global ledger, Canton operates as a "network of networks." Each participating institution maintains its own ledger — called a synchronization domain — while connecting to others through the Global Synchronizer. This design means Goldman Sachs's trading systems and BNP Paribas's settlement infrastructure can execute atomic cross-institutional transactions without either party seeing the other's full position.

The privacy model is fundamental, not optional. Canton uses Digital Asset's Daml smart contract language, which enforces authorization and visibility rules at the language level. Every contract action requires explicit approval from designated parties. Read permissions are codified at every step. The network synchronizes contract execution across stakeholders on a strict need-to-know basis.

This is not privacy through zero-knowledge proofs or encryption layered on top. It is privacy built into the execution model itself.

The Numbers: $6 Trillion and Counting

Canton's scale is difficult to overstate when compared to public DeFi.

Broadridge's Distributed Ledger Repo (DLR) is the single largest application on Canton. It processes approximately $280 billion daily in tokenized U.S. Treasury repos — roughly $4 trillion per month. This is real overnight funding activity that previously cleared through traditional settlement systems. Broadridge scaled from $2 trillion to $4 trillion monthly during 2025 alone.

The weekend settlement breakthrough in August 2025 demonstrated Canton's most disruptive capability. Bank of America, Citadel Securities, DTCC, Societe Generale, and Tradeweb completed the first real-time, on-chain financing of U.S. Treasuries against USDC — on a Saturday. Traditional markets treat weekends as dead time: trapped capital, idle collateral, and liquidity buffers banks maintain just to survive settlement downtime. Canton eliminated that constraint with a single transaction, providing true 24/7 funding capabilities.

Over 600 institutions now use Canton Network, supported by more than 30 super validators and 500 validators including Binance US, Crypto.com, Gemini, and Kraken.

For context, the total value locked across all of public DeFi peaked at approximately $180 billion. Canton processes more than that in a single month of repo activity from one application.

JPM Coin Comes to Canton

On January 8, 2026, Digital Asset and Kinexys by J.P. Morgan announced their intention to bring JPM Coin (ticker: JPMD) natively to the Canton Network. This is arguably the most significant institutional blockchain deployment of the year.

JPM Coin is not a stablecoin in the retail crypto sense. It is a deposit token — a blockchain-native representation of U.S. dollar deposits held at JPMorgan. Kinexys, the bank's blockchain division, already processes $2-3 billion in daily transaction volume with cumulative volume exceeding $1.5 trillion since 2019.

The Canton integration will proceed in phases throughout 2026:

  • Phase 1: Technical and business framework for issuance, transfer, and near-instant redemption of JPM Coin directly on Canton
  • Phase 2: Exploration of additional Kinexys Digital Payments products, including Blockchain Deposit Accounts
  • Phase 3: Potential expansion to additional blockchain platforms

Canton is JPM Coin's second network after launching on Base (Coinbase's Ethereum L2) in November 2025. But the Canton deployment carries different implications. On Base, JPM Coin interacts with public DeFi infrastructure. On Canton, it integrates with the institutional settlement layer where trillions in assets already transact.

JPMorgan and DBS are simultaneously developing an interoperability framework for tokenized deposit transfers across various types of blockchain networks — meaning JPM Coin on Canton could eventually settle against tokenized assets on other chains.

DTCC: The $70 Trillion Custodian Goes On-Chain

If JPMorgan on Canton represents institutional payments going on-chain, DTCC represents the clearance and settlement infrastructure itself migrating.

DTCC clears the vast majority of U.S. securities transactions. In December 2025, DTCC announced a partnership with Digital Asset to tokenize a subset of DTC-custodied U.S. Treasury securities on Canton infrastructure, targeted for 2026. The SEC issued a no-action letter providing explicit regulatory approval for the use case.

The DTCC deployment uses ComposerX, a tokenization tool, combined with Canton's interoperable, privacy-preserving layer. The implications are profound: tokenized Treasuries that settle on Canton rails can interact with JPM Coin for payment, with Broadridge's repo platform for financing, and with other Canton applications for collateral management — all within the same privacy-preserving network.

The Canton Foundation, which oversees network governance, is co-chaired by DTCC and Euroclear — the two entities that collectively custody and settle most of the world's securities.

Canton Coin: The Token Nobody Talks About

Canton has a native utility token, Canton Coin (CC), that launched alongside the Global Synchronizer in July 2024. It trades on 11 global exchanges at approximately $0.15 as of early 2026.

The tokenomics are distinctly institutional in design:

No pre-mine, no pre-sale. Canton Coin had no venture allocation, no insider distribution, and no token generation event in the traditional crypto sense. Tokens are minted as rewards for network operators — primarily regulated financial institutions that run the Global Synchronizer.

Burn-Mint Equilibrium (BME). Every fee paid in CC is permanently burned. The network targets approximately 2.5 billion coins minted and burned annually. In periods of high network usage, burning outpaces minting, reducing supply. Over $110 million in CC has already been burned.

Approximately 22 billion CC in circulation as of early 2025, with a total minable supply of roughly 100 billion over the first ten years.

Permissioned validation. Rather than open proof-of-stake, Canton uses a utility-based incentive model where operators earn CC for delivering reliability and uptime. Misconduct or downtime results in loss of rewards and removal from the validator set.

This design creates a token whose value is directly tied to institutional transaction volume rather than speculative trading. As DTCC tokenization launches and JPM Coin integration ramps up, the burn mechanism means increasing network usage mechanically reduces CC supply.

In September 2025, Canton partnered with Chainlink to integrate Data Streams, SmartData (Proof of Reserve, NAVLink), and the Cross-Chain Interoperability Protocol (CCIP).

This partnership is significant because it bridges Canton's institutional world with public blockchain infrastructure. Chainlink CCIP enables cross-chain communication between Canton and public chains — meaning tokenized assets on Canton could eventually interact with DeFi protocols on Ethereum, while maintaining Canton's privacy guarantees for institutional participants.

The integration also brings Chainlink's oracle infrastructure to Canton, providing institutional-grade price feeds and proof-of-reserve attestations for tokenized assets. For institutional participants holding tokenized Treasuries on Canton, this means verifiable, real-time NAV calculations and reserve proofs without exposing portfolio positions.

What Canton Means for the Broader Crypto Ecosystem

Canton's existence raises an uncomfortable question for public DeFi: what happens when institutions do not need Ethereum, Solana, or any public chain for their core financial operations?

The answer is nuanced. Canton is not competing with public DeFi — it is serving a market that public DeFi was never designed for. Overnight repo financing, cross-border settlement, securities custody, and institutional payment rails require privacy, compliance, and regulatory approval that public chains cannot provide in their current form.

But Canton is also not isolated. The JPM Coin deployment on both Base and Canton signals a multi-chain strategy where institutional assets exist across permissioned and permissionless infrastructure. The Chainlink CCIP integration creates a technical bridge between the two worlds. And USDC's role in Canton's weekend settlement transaction shows that public stablecoins can serve as the cash leg in institutional blockchain operations.

The most likely outcome is a two-layer financial system: Canton (and similar institutional networks) handling the core plumbing of securities settlement, payments, and custody, while public DeFi protocols provide the open-access innovation layer for retail users and emerging markets.

Digital Asset raised $135 million in June 2025, led by DRW Venture Capital and Tradeweb Markets, with additional strategic investment from BNY, Nasdaq, and S&P Global in December 2025. The investor list reads like a directory of global financial infrastructure providers — and they are not making speculative bets. They are investing in the system they plan to operate.

Canton Network may not generate the social media engagement of a memecoin launch. But with $6 trillion in tokenized assets, JPMorgan's deposit token, DTCC's Treasury tokenization, and the institutional validator set that reads like a G-SIB roster, it is arguably the most consequential blockchain deployment in the industry's history.

The blockchain revolution that Wall Street was always waiting for did not come from disrupting finance from the outside. It came from rebuilding the existing infrastructure on better technology — privately, compliantly, and at a scale that makes public DeFi look like a proof of concept.


BlockEden.xyz provides enterprise-grade multi-chain RPC infrastructure supporting the growing institutional blockchain ecosystem. As networks like Canton bridge traditional finance with on-chain settlement, reliable node infrastructure becomes the foundational layer connecting public and permissioned blockchain worlds. Explore our API marketplace for production-grade blockchain access.

The End of Crypto Privacy in Europe: DAC8 Takes Effect and What It Means for 450 Million Users

· 10 min read
Dora Noda
Software Engineer

As of January 1, 2026, crypto privacy in the European Union effectively ended. The Eighth Directive on Administrative Cooperation (DAC8) went live across all 27 member states, mandating that every centralized crypto exchange, wallet provider, and custodial platform transmit customer names, tax identification numbers, and complete transaction records directly to national tax authorities. With no opt-out for users who want to continue receiving services, the directive represents the most significant regulatory shift in European crypto history.

For the approximately 450 million EU residents who may use cryptocurrency, DAC8 transforms digital assets from a semi-private financial tool into one of the most surveilled asset classes on the continent. The implications extend far beyond tax compliance, reshaping the competitive landscape between centralized and decentralized platforms, driving capital flows to non-EU jurisdictions, and forcing a fundamental reckoning with what crypto means in a world of total financial transparency.

Billions Network: The $35M Identity Layer for Humans and AI Agents

· 9 min read
Dora Noda
Software Engineer

Your eyeballs are not the only way to prove you're human. While Sam Altman's World (formerly Worldcoin) has built its identity empire on iris scans and proprietary Orb devices, a quieter revolution is underway. Billions Network just raised $35 million to prove that a smartphone and a government ID can accomplish what biometric surveillance cannot: scalable, privacy-preserving verification for both humans and AI agents in a world where the line between them grows blurrier by the day.

The timing couldn't be more critical. As autonomous AI agents begin managing DeFi portfolios, executing trades, and interacting with blockchain protocols, the question "Who—or what—am I dealing with?" has become existential for crypto's future. Billions Network offers an answer that doesn't require surrendering your biometric data to a centralized database.

The KYA Revolution: From Know Your Customer to Know Your Agent

The crypto industry spent a decade arguing about KYC (Know Your Customer) requirements. Now, a more fundamental shift is underway: KYA, or "Know Your Agent."

As 2026 unfolds, the average user on a decentralized finance platform is increasingly not a human sitting behind a screen. It's an autonomous AI agent controlling its own crypto wallet, managing on-chain treasuries, and executing transactions at speeds no human could match. Under the emerging KYA standard, any AI agent interacting with institutional liquidity pools or tokenized real-world assets must verify its origin and disclose the identity of its creator or legal owner.

KYAs function like digital passports for AI—cryptographically signed credentials that prove an agent works for a real person or company and follows rules. Merchants can trust the agent won't break laws, and agents get bank-like access to buy and sell. This isn't theoretical: Visa's Trusted Agent Protocol already provides cryptographic standards for recognizing and transacting with approved AI agents, while Coinbase's x402 protocol enables seamless micropayments for machine-to-machine transactions.

But here's the problem: How do you verify the human behind an AI agent without creating a surveillance infrastructure that tracks every interaction? This is where Billions Network enters the picture.

Billions Network: Zero-Knowledge Identity Without the Dystopia

Founded by the team behind Privado ID (formerly Polygon ID) and creators of Circom—the zero-knowledge proof library powering Worldcoin, TikTok, Scroll, Aptos, and 9,000+ projects—Billions Network approaches identity verification from a fundamentally different angle than its competitors.

The process is elegantly simple: users scan their passport or government ID using the mobile app's NFC technology, which generates cryptographic proofs of authenticity without storing personal data on centralized servers. No Orb appointments. No iris scans. No biometric databases.

"I agree with Vitalik that your identity should not be tied to keys you cannot rotate," the Billions team has stated. "Furthermore, you cannot rotate your eyeballs. That persistent identifier, inescapably, is very limiting."

This philosophical difference has practical implications. Billions Network allows multiple unlinkable identities and key rotation, enhancing pseudonymity for users who need different verified identities for different contexts. World's single-ID-per-person model, while simpler, raises concerns about trackability despite its zero-knowledge protections.

The Numbers: 2 Million vs. 17 Million, But There's a Catch

On raw user numbers, Billions Network's 2 million verified users seems modest compared to World's 17 million. But the underlying technology tells a different story.

Circom, the open-source zero-knowledge library created by the Billions team, has been deployed across 9,000 sites including TikTok, HSBC, and Deutsche Bank. More than 150 million combined users interact with systems built on this technology stack. The verification infrastructure already exists—Billions Network is simply making it accessible to everyone with a smartphone.

The $35 million funding round from Polychain Capital, Coinbase Ventures, Polygon Ventures, LCV, and Bitkraft Ventures reflects institutional confidence in this approach. Deutsche Bank, HSBC, and Telefónica Tech have already tested Billions' verification in multiple proof-of-concepts, proving its scalability for enterprise use cases.

AI Agent Identity: The $7.7 Billion Market Nobody's Talking About

The AgentFi sector has exploded to a $7.7 billion market cap, with projects like Fetch.ai and Bittensor leading the charge. The sector added $10 billion in market cap in a single week during late 2025, signaling more than passing speculation.

But here's the challenge these AI agents face: they need verifiable identities to operate in regulated environments. An AI trading bot can't custody assets at a regulated exchange without some form of KYA compliance. A DeFi protocol can't accept transactions from an AI agent without knowing who bears liability if something goes wrong.

Billions Network's January 2026 launch of "Know Your Agent" directly addresses this gap. The system gives AI agents verifiable identity, clear ownership, and public accountability—all without requiring the AI's human operator to sacrifice their own privacy.

The technical implementation involves Digital Agent Passports (DAPs), lightweight tamper-proof tokens that follow five core steps: verify the agent developer, lock the agent code, capture user permission, issue the passport, and provide ongoing lookup to continuously check agent status.

The Regulatory Tailwind

Recent regulatory actions have inadvertently boosted Billions Network's positioning. Brazil's data protection authority imposed limitations on Worldcoin's iris scanning operations. Multiple European regulators have raised concerns about biometric data collection for identity verification.

Billions Network's non-biometric approach sidesteps these regulatory minefields entirely. There's no biometric data to protect, leak, or misuse. The Indian government is already in discussions to integrate Billions' system with Aadhaar, the country's national identity framework covering over a billion people.

The EU's DAC8 digital asset tax reporting directive, which went live January 1, 2026, creates additional demand for compliant identity verification that doesn't require invasive data collection. Billions' zero-knowledge approach lets users prove tax residency and identity attributes without exposing the underlying personal information.

The $BILL Token: Usage-Driven Deflation

Unlike many crypto projects that rely on inflationary tokenomics and speculation, $BILL operates on usage-driven deflation. Network fees are used to maintain tokenomics balance through automated burning mechanisms, aligning network growth with token demand dynamics.

The total supply of 10 billion BILLtokensincludesapproximately32BILL tokens includes approximately 32% reserved for community distribution. The token economy is designed around a simple premise: as more humans and AI agents use the verification network, demand for BILL increases while supply decreases through burns.

This creates an interesting dynamic in the AI agent economy. Every time an AI agent verifies its identity or a human proves their personhood, value flows through the BILL ecosystem. Given the projected explosion in AI agent transactions—Chainalysis estimates the market for agentic payments could reach \29 million across 50 million merchants—the potential transaction volume is substantial.

Beyond Worldcoin: The Cypherpunk Alternative

The Billions team has positioned their project as the "cypherpunk" alternative to Worldcoin's approach. Where World requires proprietary hardware and biometric submission, Billions requires only a phone and government ID. Where World creates a single persistent identifier tied to unchangeable biometrics, Billions allows identity flexibility and key rotation.

"Worldcoin's Orb is cool tech, but it's a logistical mess," critics have noted. "Not everyone lives near a Worldcoin Orb, so millions are left out."

The accessibility argument may prove decisive. Government-issued IDs with NFC chips are already widespread in developed nations and expanding rapidly in developing economies. No new hardware rollout is required. No appointments. No trust in a centralized biometric database.

What This Means for Web3 Builders

For developers building on blockchain infrastructure, Billions Network represents a new primitive: verifiable identity that respects privacy and works across chains. The AggLayer integration means verified identities can move seamlessly between Polygon-connected networks, reducing friction for cross-chain applications.

The AI agent identity layer opens particularly interesting possibilities. Imagine a DeFi protocol that can offer different fee tiers based on verified agent reputation, or an NFT marketplace that can prove an AI-generated artwork's provenance through verified agent identity. The composability of blockchain combined with verifiable identity creates design space that didn't exist before.

The Path Forward

The race to define Web3 identity is far from over. World has the user numbers and Sam Altman's star power. Billions has the infrastructure integration and regulatory-friendly approach. Both are betting that as AI agents proliferate, identity verification will become the most critical layer of the stack.

What's clear is that the old model—where identity meant either complete anonymity or complete surveillance—is giving way to something more nuanced. Zero-knowledge proofs allow verification without exposure. Decentralized systems allow trust without central authorities. And AI agents require all of this to function in a world that still demands accountability.

The question isn't whether identity verification will become mandatory for meaningful crypto participation. It's whether that verification will respect human privacy and autonomy, or whether we'll trade our biometrics for access to the financial system. Billions Network is betting $35 million that there's a better way.


BlockEden.xyz provides high-performance RPC and API infrastructure for privacy-focused blockchain applications. As identity layers like Billions Network integrate with major chains, our infrastructure scales to support the next generation of privacy-preserving applications. Explore our API marketplace for enterprise-grade blockchain connectivity.


Sources

Navigating the Privacy Technology Landscape: FHE, ZK, and TEE in Blockchain

· 10 min read
Dora Noda
Software Engineer

When Zama became the first fully homomorphic encryption unicorn in June 2025—valued at over $1 billion—it signaled something larger than one company's success. The blockchain industry had finally accepted a fundamental truth: privacy isn't optional, it's infrastructure.

But here's the uncomfortable reality developers face: there's no single "best" privacy technology. Fully Homomorphic Encryption (FHE), Zero-Knowledge Proofs (ZK), and Trusted Execution Environments (TEE) each solve different problems with different tradeoffs. Choosing wrong doesn't just impact performance—it can fundamentally compromise what you're trying to build.

This guide breaks down when to use each technology, what you're actually trading off, and why the future likely involves all three working together.

The Privacy Technology Landscape in 2026

The blockchain privacy market has evolved from niche experimentation to serious infrastructure. ZK-based rollups now secure over $28 billion in Total Value Locked. The Zero-Knowledge KYC market alone is projected to grow from $83.6 million in 2025 to $903.5 million by 2032—a 40.5% compound annual growth rate.

But market size doesn't help you choose a technology. Understanding what each approach actually does is the starting point.

Zero-Knowledge Proofs: Proving Without Revealing

ZK proofs allow one party to prove a statement is true without revealing any information about the content itself. You can prove you're over 18 without revealing your birthdate, or prove a transaction is valid without exposing the amount.

How it works: The prover generates a cryptographic proof that a computation was performed correctly. The verifier can check this proof quickly without re-running the computation or seeing the underlying data.

The catch: ZK excels at proving things about data you already hold. It struggles with shared state. You can prove your balance is sufficient for a transaction, but you can't easily ask questions like "how many fraud cases happened chain-wide?" or "who won this sealed-bid auction?" without additional infrastructure.

Leading projects: Aztec enables hybrid public/private smart contracts where users choose whether transactions are visible. zkSync focuses primarily on scalability with enterprise-focused "Prividiums" for permissioned privacy. Railgun and Nocturne provide shielded transaction pools.

Fully Homomorphic Encryption: Computing on Encrypted Data

FHE is often called the "holy grail" of encryption because it allows computation on encrypted data without ever decrypting it. The data stays encrypted during processing, and the results remain encrypted—only the authorized party can decrypt the output.

How it works: Mathematical operations are performed directly on ciphertexts. Addition and multiplication on encrypted values produce encrypted results that, when decrypted, match what you'd get from operating on plaintext.

The catch: Computational overhead is massive. Even with recent optimizations, FHE-based smart contracts on Inco Network achieve only 10-30 TPS depending on hardware—orders of magnitude slower than plaintext execution.

Leading projects: Zama provides the foundational infrastructure with FHEVM (their fully homomorphic EVM). Fhenix builds application-layer solutions using Zama's technology, having deployed CoFHE coprocessor on Arbitrum with decryption speeds up to 50x faster than competing approaches.

Trusted Execution Environments: Hardware-Based Isolation

TEEs create secure enclaves within processors where computations occur in isolation. Data inside the enclave remains protected even if the broader system is compromised. Unlike cryptographic approaches, TEEs rely on hardware rather than mathematical complexity.

How it works: Specialized hardware (Intel SGX, AMD SEV) creates isolated memory regions. Code and data inside the enclave are encrypted and inaccessible to the operating system, hypervisor, or other processes—even with root access.

The catch: You're trusting hardware manufacturers. Any single compromised enclave can leak plaintext, regardless of how many nodes participate. In 2022, a critical SGX vulnerability forced coordinated key updates across Secret Network, demonstrating the operational complexity of hardware-dependent security.

Leading projects: Secret Network pioneered private smart contracts using Intel SGX. Oasis Network's Sapphire is the first confidential EVM in production, processing up to 10,000 TPS. Phala Network operates over 1,000 TEE nodes for confidential AI workloads.

The Tradeoff Matrix: Performance, Security, and Trust

Understanding the fundamental tradeoffs helps match technology to use case.

Performance

TechnologyThroughputLatencyCost
TEENear-native (10,000+ TPS)LowLow operational cost
ZKModerate (varies by implementation)Higher (proof generation)Medium
FHELow (10-30 TPS currently)HighVery high operational cost

TEEs win on raw performance because they're essentially running native code in protected memory. ZK introduces proof generation overhead but verification is fast. FHE currently requires intensive computation that limits practical throughput.

Security Model

TechnologyTrust AssumptionPost-QuantumFailure Mode
TEEHardware manufacturerNot resistantSingle enclave compromise exposes all data
ZKCryptographic (often trusted setup)Varies by schemeProof system bugs can be invisible
FHECryptographic (lattice-based)ResistantComputationally intensive to exploit

TEEs require trusting Intel, AMD, or whoever manufactures the hardware—plus trusting that no firmware vulnerabilities exist. ZK systems often require "trusted setup" ceremonies, though newer schemes eliminate this. FHE's lattice-based cryptography is believed quantum-resistant, making it the strongest long-term security bet.

Programmability

TechnologyComposabilityState PrivacyFlexibility
TEEHighFullLimited by hardware availability
ZKLimitedLocal (client-side)High for verification
FHEFullGlobalLimited by performance

ZK excels at local privacy—protecting your inputs—but struggles with shared state across users. FHE maintains full composability because encrypted state can be computed upon by anyone without revealing contents. TEEs offer high programmability but are constrained to environments with compatible hardware.

Choosing the Right Technology: Use Case Analysis

Different applications demand different tradeoffs. Here's how leading projects are making these choices.

DeFi: MEV Protection and Private Trading

Challenge: Front-running and sandwich attacks extract billions from DeFi users by exploiting visible mempools.

FHE solution: Zama's confidential blockchain enables transactions where parameters remain encrypted until block inclusion. Front-running becomes mathematically impossible—there's no visible data to exploit. The December 2025 mainnet launch included the first confidential stablecoin transfer using cUSDT.

TEE solution: Oasis Network's Sapphire enables confidential smart contracts for dark pools and private order matching. Lower latency makes it suitable for high-frequency trading scenarios where FHE's computational overhead is prohibitive.

When to choose: FHE for applications requiring the strongest cryptographic guarantees and global state privacy. TEE when performance requirements exceed what FHE can deliver and hardware trust is acceptable.

Identity and Credentials: Privacy-Preserving KYC

Challenge: Proving identity attributes (age, citizenship, accreditation) without exposing documents.

ZK solution: Zero-knowledge credentials let users prove "KYC passed" without revealing underlying documents. This satisfies compliance requirements while protecting user privacy—a critical balance as regulatory pressure intensifies.

Why ZK wins here: Identity verification is fundamentally about proving statements about personal data. ZK is purpose-built for this: compact proofs that verify without revealing. The verification is fast enough for real-time use.

Confidential AI and Sensitive Computation

Challenge: Processing sensitive data (healthcare, financial models) without exposure to operators.

TEE solution: Phala Network's TEE-based cloud processes LLM queries without platform access to inputs. With GPU TEE support (NVIDIA H100/H200), confidential AI workloads run at practical speeds.

FHE potential: As performance improves, FHE enables computation where even the hardware operator can't access data—removing the trust assumption entirely. Current limitations restrict this to simpler computations.

Hybrid approach: Run initial data processing in TEEs for speed, use FHE for the most sensitive operations, and generate ZK proofs to verify results.

The Vulnerability Reality

Each technology has failed in production—understanding failure modes is essential.

TEE Failures

In 2022, critical SGX vulnerabilities affected multiple blockchain projects. Secret Network, Phala, Crust, and IntegriTEE required coordinated patches. Oasis survived because its core systems run on older SGX v1 (unaffected) and don't rely on enclave secrecy for funds safety.

Lesson: TEE security depends on hardware you don't control. Defense-in-depth (key rotation, threshold cryptography, minimal trust assumptions) is mandatory.

ZK Failures

On April 16, 2025, Solana patched a zero-day vulnerability in its Confidential Transfers feature. The bug could have enabled unlimited token minting. The dangerous aspect of ZK failures: when proofs fail, they fail invisibly. You can't see what shouldn't be there.

Lesson: ZK systems require extensive formal verification and audit. The complexity of proof systems creates attack surface that's difficult to reason about.

FHE Considerations

FHE hasn't experienced major production failures—largely because it's earlier in deployment. The risk profile differs: FHE is computationally intensive to attack, but implementation bugs in complex cryptographic libraries could enable subtle vulnerabilities.

Lesson: Newer technology means less battle-testing. The cryptographic guarantees are strong, but the implementation layer needs continued scrutiny.

Hybrid Architectures: The Future Isn't Either/Or

The most sophisticated privacy systems combine multiple technologies, using each where it excels.

ZK + FHE Integration

User states (balances, preferences) stored with FHE encryption. ZK proofs verify valid state transitions without exposing encrypted values. This enables private execution within scalable L2 environments—combining FHE's global state privacy with ZK's efficient verification.

TEE + ZK Combination

TEEs process sensitive computations at near-native speed. ZK proofs verify that TEE outputs are correct, removing the single-operator trust assumption. If the TEE is compromised, invalid outputs would fail ZK verification.

When to Use What

A practical decision framework:

Choose TEE when:

  • Performance is critical (high-frequency trading, real-time applications)
  • Hardware trust is acceptable for your threat model
  • You need to process large data volumes quickly

Choose ZK when:

  • You're proving statements about client-held data
  • Verification must be fast and low-cost
  • You don't need global state privacy

Choose FHE when:

  • Global state must remain encrypted
  • Post-quantum security is required
  • Computation complexity is acceptable for your use case

Choose hybrid when:

  • Different components have different security requirements
  • You need to balance performance with security guarantees
  • Regulatory compliance requires demonstrable privacy

What Comes Next

Vitalik Buterin recently pushed for standardized "efficiency ratios"—comparing cryptographic computation time to plaintext execution. This reflects the industry's maturation: we're moving from "does it work?" to "how efficiently does it work?"

FHE performance continues improving. Zama's December 2025 mainnet proves production-readiness for simple smart contracts. As hardware acceleration develops (GPU optimization, custom ASICs), the throughput gap with TEEs will narrow.

ZK systems are becoming more expressive. Aztec's Noir language enables complex private logic that would have been impractical years ago. Standards are slowly converging, enabling cross-chain ZK credential verification.

TEE diversity is expanding beyond Intel SGX. AMD SEV, ARM TrustZone, and RISC-V implementations reduce dependency on any single manufacturer. Threshold cryptography across multiple TEE vendors could address the single-point-of-failure concern.

The privacy infrastructure buildout is happening now. For developers building privacy-sensitive applications, the choice isn't about finding the perfect technology—it's about understanding tradeoffs well enough to combine them intelligently.


Building privacy-preserving applications on blockchain? BlockEden.xyz provides high-performance RPC endpoints across 30+ networks, including privacy-focused chains. Explore our API marketplace to access the infrastructure your confidential applications need.

Nillion's Blind Computing Revolution: Processing Data Without Ever Seeing It

· 9 min read
Dora Noda
Software Engineer

What if you could run AI inference on your most sensitive medical records, and the AI never actually "sees" the data it's processing? This isn't science fiction — it's the core promise of blind computing, and Nillion has raised $50 million from investors like Hack VC, HashKey Capital, and Distributed Global to make it the default way the internet handles sensitive information.

The privacy computing market is projected to explode from $5.6 billion in 2025 to over $46 billion by 2035. But unlike previous privacy solutions that required trusting someone with your data, blind computing eliminates the trust problem entirely. Your data stays encrypted — even while being processed.

zkTLS Explained: How Zero-Knowledge Proofs Are Unlocking the Web's Hidden Data Layer

· 9 min read
Dora Noda
Software Engineer

What if you could prove your bank account has $10,000 without revealing your balance, transaction history, or even your name? That's not a hypothetical scenario — it's happening right now through zkTLS, a cryptographic breakthrough that's quietly reshaping how Web3 applications access the 99% of internet data trapped behind login screens.

While blockchain oracles like Chainlink solved the price feed problem years ago, a far larger challenge remained unsolved: how do you bring private, authenticated web data on-chain without trusting centralized intermediaries or exposing sensitive information? The answer is zkTLS — and it's already powering undercollateralized DeFi loans, privacy-preserving KYC, and a new generation of applications that bridge Web2 credentials with Web3 composability.

a16z's 17 Crypto Predictions for 2026: Bold Visions, Hidden Agendas, and What They Got Right

· 9 min read
Dora Noda
Software Engineer

When the world's largest crypto-focused venture capital firm publishes its annual predictions, the industry listens. But should you believe everything Andreessen Horowitz tells you about 2026?

a16z crypto recently released "17 things we're excited about for crypto in 2026"—a sweeping manifesto covering AI agents, stablecoins, privacy, prediction markets, and the future of internet payments. With $7.6 billion in crypto assets under management and a portfolio that includes Coinbase, Uniswap, and Solana, a16z isn't just predicting the future. They're betting billions on it.

That creates an interesting tension. When a VC firm managing 18% of all U.S. venture capital points to specific trends, capital flows follow. So are these predictions genuine foresight, or sophisticated marketing for their portfolio companies? Let's dissect each major theme—what's genuinely insightful, what's self-serving, and what they're getting wrong.

The Stablecoin Thesis: Credible, But Overstated

a16z's biggest bet is that stablecoins will continue their explosive trajectory. The numbers they cite are impressive: $46 trillion in transaction volume last year—more than 20x PayPal's volume, approaching Visa's territory, and rapidly catching up to ACH.

What they got right: Stablecoins genuinely crossed into mainstream finance in 2025. Visa expanded its USDC settlement program on Solana. Mastercard joined Paxos' Global Dollar Network. Circle has over 100 financial institutions in its pipeline. Bloomberg Intelligence projects stablecoin payment flows will hit $5.3 trillion by year-end 2026—an 82.7% increase.

The regulatory tailwind is real too. The GENIUS Act, expected to pass in early 2026, would establish clear rules for stablecoin issuance under FDIC supervision, giving banks a regulated path to issue dollar-backed stablecoins.

The counterpoint: a16z is deeply invested in the stablecoin ecosystem through portfolio companies like Coinbase (which issues USDC through its partnership with Circle). When they predict "the internet becomes the bank" through programmable stablecoin settlement, they're describing a future where their investments become infrastructure.

The $46 trillion figure also deserves scrutiny. Much of stablecoin transaction volume is circular—traders moving funds between exchanges, DeFi protocols churning liquidity, arbitrageurs cycling positions. The Treasury identifies $5.7 trillion in "at-risk" deposits that could migrate to stablecoins, but actual consumer and business adoption remains a fraction of headline numbers.

Reality check: Stablecoins will grow significantly, but "the internet becomes the bank" is a decade away, not a 2026 reality. Banks move slowly for good reasons—compliance, fraud prevention, consumer protection. Stripe adding stablecoin rails doesn't mean your grandmother will pay rent in USDC next year.

The AI Agent Prediction: Visionary, But Premature

a16z's most forward-looking prediction introduces "KYA"—Know Your Agent—a cryptographic identity system for AI agents that would let autonomous systems make payments, sign contracts, and transact without human intervention.

Sean Neville, who wrote this prediction, argues the bottleneck has shifted from AI intelligence to AI identity. Financial services now have "non-human identities" outnumbering human employees 96-to-1, yet these systems remain "unbanked ghosts" that can't autonomously transact.

What they got right: The agentic economy is real and growing. Fetch.ai is launching what it calls the world's first autonomous AI payment system in January 2026. Visa's Trusted Agent Protocol provides cryptographic standards for verifying AI agents. PayPal and OpenAI partnered to enable agentic commerce in ChatGPT. The x402 protocol for machine-to-machine payments has been adopted by Google Cloud, AWS, and Anthropic.

The counterpoint: The DeFAI hype cycle of early 2025 already crashed once. Teams experimented with AI agents for automated trading, wallet management, and token sniping. Most delivered nothing of real-world value.

The fundamental challenge isn't technical—it's liability. When an AI agent makes a bad trade or gets tricked into a malicious transaction, who's responsible? Current legal frameworks have no answer. KYA solves the identity problem but not the accountability problem.

There's also the systemic risk nobody wants to discuss: what happens when thousands of AI agents running similar strategies interact? "Highly reactive agents may trigger chain reactions," admits one industry analysis. "Strategy collisions will cause short-term chaos."

Reality check: AI agents making autonomous crypto payments will remain experimental in 2026. The infrastructure is being built, but regulatory clarity and liability frameworks are years behind the technology.

Privacy as "The Ultimate Moat": Right Problem, Wrong Framing

Ali Yahya's prediction that privacy will define blockchain winners in 2026 is the most technically sophisticated argument in the collection. His thesis: the throughput wars are over. Every major chain now handles thousands of transactions per second. The new differentiator is privacy, and "bridging secrets is hard"—meaning users who commit to a privacy-preserving chain face real friction leaving.

What they got right: Privacy demand is surging. Google searches for crypto privacy reached new highs in 2025. Zcash's shielded pool grew to nearly 4 million ZEC. Railgun's transaction flows exceeded $200 million monthly. Arthur Hayes echoed this sentiment: "Large institutions don't want their information public or at risk of going public."

The technical argument is sound. Privacy creates network effects that throughput doesn't. You can bridge tokens between chains trivially. You can't bridge transaction history without exposing it.

The counterpoint: a16z has significant investments in Ethereum L2s and projects that would benefit from privacy upgrades. When they predict privacy becomes essential, they're partly lobbying for features their portfolio companies need.

More importantly, there's a regulatory elephant in the room. The same governments that recently sanctioned Tornado Cash aren't going to embrace privacy chains overnight. The tension between institutional adoption (which requires KYC/AML) and genuine privacy (which undermines it) hasn't been resolved.

Reality check: Privacy will matter more in 2026, but "winner-take-most" dynamics are overstated. Regulatory pressure will fragment the market into compliant quasi-privacy solutions for institutions and genuinely private chains for everyone else.

Prediction Markets: Undersold, Actually

Andrew Hall's prediction that prediction markets will "go bigger, broader, smarter" is perhaps the least controversial item on the list—and one where a16z might be underselling the opportunity.

What they got right: Polymarket proved prediction markets can go mainstream during the 2024 U.S. election. The platform generated more accurate forecasts than traditional polling in several races. Now the question is whether that success translates beyond political events.

Hall predicts LLM oracles resolving disputed markets, AI agents trading to surface novel predictive signals, and contracts on everything from corporate earnings to weather events.

The counterpoint: Prediction markets face fundamental liquidity challenges outside major events. A market predicting the outcome of the Super Bowl attracts millions in volume. A market predicting next quarter's iPhone sales struggles to find counterparties.

Regulatory uncertainty also looms. The CFTC has been increasingly aggressive about treating prediction markets as derivatives, which would require burdensome compliance for retail participants.

Reality check: Prediction markets will expand significantly, but the "markets on everything" vision requires solving liquidity bootstrapping and regulatory clarity. Both are harder than the technology.

The Overlooked Predictions Worth Watching

Beyond the headline themes, several quieter predictions deserve attention:

"From 'Code is Law' to 'Spec is Law'" — Daejun Park describes moving DeFi security from bug-hunting to proving global invariants through AI-assisted specification writing. This is unglamorous infrastructure work, but could dramatically reduce the $3.4 billion lost to hacks annually.

"The Invisible Tax on the Open Web" — Elizabeth Harkavy's warning that AI agents extracting content without compensating creators could break the internet's economic model is genuinely important. If AI strips the monetization layer from content while bypassing ads, something has to replace it.

"Trading as Way Station, Not Destination" — Arianna Simpson's advice that founders chasing immediate trading revenue miss defensible opportunities is probably the most honest prediction in the collection—and a tacit admission that much of crypto's current activity is speculation masquerading as utility.

What a16z Doesn't Want to Talk About

Conspicuously absent from the 17 predictions: any acknowledgment of the risks their bullish outlook ignores.

Memecoin fatigue is real. Over 13 million memecoins launched last year, but launches dropped 56% from January to September. The speculation engine that drove retail interest is sputtering.

Macro headwinds could derail everything. The predictions assume continued institutional adoption, regulatory clarity, and technology deployment. A recession, a major exchange collapse, or aggressive regulatory action could reset the timeline by years.

The a16z portfolio effect is distorting. When a firm managing $46 billion in total AUM and $7.6 billion in crypto publishes predictions that benefit their investments, the market responds—creating self-fulfilling prophecies that don't reflect organic demand.

The Bottom Line

a16z's 17 predictions are best understood as a strategic document, not neutral analysis. They're telling you where they've placed their bets and why you should believe those bets will pay off.

That doesn't make them wrong. Many of these predictions—stablecoin growth, AI agent infrastructure, privacy upgrades—reflect genuine trends. The firm employs some of the smartest people in crypto and has a track record of identifying winning narratives early.

But sophisticated readers should apply a discount rate. Ask who benefits from each prediction. Consider which portfolio companies are positioned to capture value. Notice what's conspicuously absent.

The most valuable insight might be the implicit thesis underneath all 17 predictions: crypto's speculation era is ending, and infrastructure era is beginning. Whether that's hopeful thinking or accurate forecasting will be tested against reality in the coming year.


The 17 a16z Crypto Predictions for 2026 at a Glance:

  1. Better stablecoin on/offramps connecting digital dollars to payment systems
  2. Crypto-native RWA tokenization with perpetual futures and onchain origination
  3. Stablecoins enabling bank ledger upgrades without rewriting legacy systems
  4. The internet becoming financial infrastructure through programmable settlement
  5. AI-powered wealth management accessible to everyone
  6. KYA (Know Your Agent) cryptographic identity for AI agents
  7. AI models performing doctoral-level research autonomously
  8. Addressing AI's "invisible tax" on open web content
  9. Privacy as the ultimate competitive moat for blockchains
  10. Decentralized messaging resistant to quantum threats
  11. Secrets-as-a-Service for programmable data access control
  12. "Spec is Law" replacing "Code is Law" in DeFi security
  13. Prediction markets expanding beyond elections
  14. Staked media replacing feigned journalistic neutrality
  15. SNARKs enabling verifiable cloud computing
  16. Trading as a way station, not destination, for builders
  17. Legal architecture matching technical architecture in crypto regulation

This article is for educational purposes only and should not be considered financial advice. The author holds no positions in a16z portfolio companies discussed in this article.

a16z 2026 Crypto Predictions: 17 Big Ideas Worth Watching (And Our Counterpoints)

· 9 min read
Dora Noda
Software Engineer

Andreessen Horowitz's crypto team has been remarkably prescient in the past—they called the NFT boom, the DeFi summer, and the modular blockchain thesis before most. Now they've released their 17 big ideas for 2026, and the predictions range from the obvious (stablecoins will keep growing) to the controversial (AI agents will need their own identity systems). Here's our analysis of each prediction, where we agree, and where we think they've missed the mark.

The Stablecoin Thesis: Already Proven, But How Much Higher?

a16z Prediction: Stablecoins will continue their explosive growth trajectory.

The numbers are staggering. In 2024, stablecoins processed $15.6 trillion in transaction volume. By 2025, that figure reached $46 trillion—more than 20 times PayPal's volume and triple Visa's. USDT alone accounts for over $190 billion in circulation, while USDC has rebounded to $45 billion after its Silicon Valley Bank scare.

Our take: This is less a prediction and more a statement of fact. The real question isn't whether stablecoins will grow, but whether new entrants like PayPal's PYUSD, Ripple's RLUSD, or yield-bearing alternatives like Ethena's USDe will capture meaningful market share from the Tether-Circle duopoly.

The more interesting dynamic is regulatory. The US GENIUS Act and CLARITY Act are reshaping the stablecoin landscape, potentially creating a two-tier system: compliant, US-regulated stablecoins for institutional use, and offshore alternatives for the rest of the world.

AI Agents Need Crypto Wallets

a16z Prediction: AI agents will become major users of crypto infrastructure, requiring their own wallets and identity credentials through a "Know Your Agent" (KYA) system.

This is one of a16z's more forward-looking predictions. As AI agents proliferate—booking travel, managing investments, executing trades—they'll need to transact autonomously. Traditional payment rails require human identity verification, creating a fundamental incompatibility.

Our take: The premise is sound, but the timeline is aggressive. Most current AI agents operate in sandboxed environments with human approval for financial actions. The jump to fully autonomous agents with their own crypto wallets faces significant hurdles:

  1. Liability questions: Who's responsible when an AI agent makes a bad trade?
  2. Sybil attacks: What prevents someone from spinning up thousands of AI agents?
  3. Regulatory uncertainty: Will regulators treat AI-controlled wallets differently?

The KYA concept is clever—essentially a cryptographic attestation that an agent was created by a verified entity and operates within certain parameters. But implementation will lag the vision by at least 2-3 years.

Privacy as a Competitive Moat

a16z Prediction: Privacy-preserving technologies will become essential infrastructure, not optional features.

The timing is notable. Just as blockchain analytics firms have achieved near-total surveillance of public chains, a16z is betting that privacy will swing back as a priority. Technologies like FHE (Fully Homomorphic Encryption), ZK proofs, and confidential computing are maturing from academic curiosities to production-ready infrastructure.

Our take: Strongly agree, but with nuance. Privacy will bifurcate into two tracks:

  • Institutional privacy: Enterprises need transaction confidentiality without compliance concerns. Solutions like Oasis Network's confidential computing or Chainlink's CCIP with privacy features will dominate here.
  • Individual privacy: More contentious. Regulatory pressure on mixing services and privacy coins will intensify, pushing privacy-conscious users toward compliant solutions that offer selective disclosure.

The projects that thread this needle—providing privacy while maintaining regulatory compatibility—will capture enormous value.

SNARKs for Verifiable Cloud Computing

a16z Prediction: Zero-knowledge proofs will extend beyond blockchain to verify any computation, enabling "trustless" cloud computing.

This is perhaps the most technically significant prediction. Today's SNARKs (Succinct Non-interactive Arguments of Knowledge) are primarily used for blockchain scaling (zkEVMs, rollups) and privacy. But the same technology can verify that any computation was performed correctly.

Imagine: you send data to a cloud provider, they return a result plus a proof that the computation was done correctly. No need to trust AWS or Google—the math guarantees correctness.

Our take: The vision is compelling, but overhead remains prohibitive for most use cases. Generating ZK proofs for general computation still costs 100-1000x the original computation. Projects like RISC Zero's Boundless and Modulus Labs' zkML are making progress, but mainstream adoption is years away.

The near-term wins will be specific, high-value use cases: verifiable AI inference, auditable financial calculations, and provable compliance checks.

Prediction Markets Go Mainstream

a16z Prediction: The success of Polymarket during the 2024 election will spark a broader prediction market boom.

Polymarket processed over $3 billion in trading volume around the 2024 US election, often proving more accurate than traditional polls. This wasn't just crypto natives gambling—mainstream media outlets cited Polymarket odds as legitimate forecasting data.

Our take: The regulatory arbitrage won't last forever. Polymarket operates offshore specifically to avoid US gambling and derivatives regulations. As prediction markets gain legitimacy, they'll face increasing regulatory scrutiny.

The more sustainable path is through regulated venues. Kalshi has SEC approval to offer certain event contracts. The question is whether regulated prediction markets can offer the same breadth and liquidity as offshore alternatives.

The Infrastructure-to-Application Shift

a16z Prediction: Value will increasingly accrue to applications rather than infrastructure.

For years, crypto's "fat protocol thesis" suggested that base layers (Ethereum, Solana) would capture most value while applications remained commoditized. a16z is now calling this into question.

The evidence: Hyperliquid captured 53% of on-chain perpetuals revenue in 2025, exceeding the fees of many L1s. Uniswap generates more revenue than most chains it deploys on. Friend.tech briefly made more money than Ethereum.

Our take: The pendulum is swinging, but infrastructure isn't going away. The nuance is that differentiated infrastructure still commands premiums—generic L1s and L2s are indeed commoditizing, but specialized chains (Hyperliquid for trading, Story Protocol for IP) can capture value.

The winners will be applications that own their stack: either by building app-specific chains or by capturing enough volume to extract favorable terms from infrastructure providers.

Decentralized Identity Beyond Finance

a16z Prediction: Blockchain-based identity and reputation systems will find use cases beyond financial applications.

We've heard this prediction for years, and it's consistently underdelivered. The difference now is that AI-generated content has created a genuine demand for proof of humanity. When anyone can generate convincing text, images, or videos, cryptographic attestations of human creation become valuable.

Our take: Cautiously optimistic. The technical pieces exist—Worldcoin's iris scanning, Ethereum Attestation Service, various soul-bound token implementations. The challenge is creating systems that are both privacy-preserving and widely adopted.

The killer app might not be "identity" per se, but specific credentials: proof of professional qualification, verified reviews, or attestations of content authenticity.

The RWA Tokenization Acceleration

a16z Prediction: Real-world asset tokenization will accelerate, driven by institutional adoption.

BlackRock's BUIDL fund crossed $500 million in assets. Franklin Templeton, WisdomTree, and Hamilton Lane have all launched tokenized products. The total RWA market (excluding stablecoins) reached $16 billion in 2025.

Our take: The growth is real, but context matters. $16 billion is a rounding error compared to traditional asset markets. The more meaningful metric is velocity—how quickly are new assets being tokenized, and are they finding secondary market liquidity?

The bottleneck isn't technology; it's legal infrastructure. Tokenizing a Treasury bill is straightforward. Tokenizing real estate with clear title, foreclosure rights, and regulatory compliance across jurisdictions is enormously complex.

Cross-Chain Interoperability Matures

a16z Prediction: The "walled garden" era of blockchains will end as cross-chain infrastructure improves.

Chainlink's CCIP, LayerZero, Wormhole, and others are making cross-chain transfers increasingly seamless. The user experience of bridging assets has improved dramatically from the clunky, risky processes of 2021.

Our take: Infrastructure is maturing, but security concerns linger. Bridge exploits accounted for billions in losses over the past few years. Each interoperability solution introduces new trust assumptions and attack surfaces.

The winning approach will likely be native interoperability—chains built from the ground up to communicate, rather than bolted-on bridge solutions.

Consumer Crypto Applications Finally Arrive

a16z Prediction: 2026 will see the first crypto applications with 100+ million users that don't feel like "crypto apps."

The argument: infrastructure improvements (lower fees, better wallets, account abstraction) have removed the friction that previously blocked mainstream adoption. The missing piece was compelling applications.

Our take: This has been predicted every year since 2017. The difference now is that the infrastructure genuinely is better. Transaction costs on L2s are measured in fractions of a cent. Smart wallets can abstract away seed phrases. Fiat on-ramps are integrated.

But "compelling applications" is the hard part. The crypto apps that have achieved scale (Coinbase, Binance) are fundamentally financial products. Non-financial killer apps remain elusive.

Our Additions: What a16z Missed

1. The Security Crisis Will Define 2026

a16z's predictions are notably silent on security. In 2025, crypto lost over $3.5 billion to hacks and exploits. The ByBit $1.5 billion hack demonstrated that even major exchanges remain vulnerable. State-sponsored actors (North Korea's Lazarus Group) are increasingly sophisticated.

Until the industry addresses fundamental security issues, mainstream adoption will remain limited.

2. Regulatory Fragmentation

The US is moving toward clearer crypto regulation, but the global picture is fragmenting. The EU's MiCA, Singapore's licensing regime, and Hong Kong's virtual asset framework create a patchwork that projects must navigate.

This fragmentation will benefit some (regulatory arbitrage opportunities) and hurt others (compliance costs for global operations).

3. The Bitcoin Treasury Movement

Over 70 public companies now hold Bitcoin on their balance sheets. MicroStrategy's playbook—leveraging corporate treasuries into Bitcoin exposure—is being copied worldwide. This institutional adoption is arguably more significant than any technical development.

Conclusion: Separating Signal from Noise

a16z's predictions are worth taking seriously—they have the portfolio exposure and technical depth to see around corners. Their stablecoin, AI agent, and privacy theses are particularly compelling.

Where we diverge is on timelines. The crypto industry has consistently overestimated how quickly transformative technologies would reach mainstream adoption. SNARKs for general computation, AI agents with crypto wallets, and 100-million-user consumer apps are all plausible—just not necessarily in 2026.

The safer bet: incremental progress on proven use cases (stablecoins, DeFi, tokenized assets) while more speculative applications continue incubating.

For builders, the message is clear: focus on real utility over narrative hype. The projects that survived 2025's carnage were those generating actual revenue and serving genuine user needs. That lesson applies regardless of which a16z predictions prove accurate.


BlockEden.xyz provides enterprise-grade blockchain infrastructure for builders focused on long-term value creation. Whether you're building the next stablecoin application, AI agent platform, or RWA tokenization service, our APIs and infrastructure are designed to scale with your vision. Explore our services to build on foundations designed to last.

Zama Protocol: The FHE Unicorn Building Blockchain's Confidentiality Layer

· 11 min read
Dora Noda
Software Engineer

Zama has established itself as the definitive leader in Fully Homomorphic Encryption (FHE) for blockchain, becoming the world's first FHE unicorn in June 2025 with a $1 billion valuation after raising over $150 million. The Paris-based company doesn't compete with blockchains—it provides the cryptographic infrastructure enabling any EVM chain to process encrypted smart contracts without ever decrypting the underlying data. With its mainnet launched on Ethereum in late December 2025 and the $ZAMA token auction beginning January 12, 2026, Zama sits at a critical inflection point where theoretical cryptographic breakthroughs meet production-ready deployment.

The strategic significance cannot be overstated: while Zero-Knowledge proofs prove computation correctness and Trusted Execution Environments rely on hardware security, FHE uniquely enables computation on encrypted data from multiple parties—solving the fundamental blockchain trilemma between transparency, privacy, and compliance. Institutions like JP Morgan have already validated this approach through Project EPIC, demonstrating confidential tokenized asset trading with full regulatory compliance. Zama's positioning as infrastructure rather than a competing chain means it captures value regardless of which L1 or L2 ultimately dominates.


Technical architecture enables encrypted computation without trust assumptions

Fully Homomorphic Encryption represents a breakthrough in cryptography that has existed in theory since 2009 but only recently became practical. The term "homomorphic" refers to the mathematical property where operations performed on encrypted data, when decrypted, yield identical results to operations on the original plaintext. Zama's implementation uses TFHE (Torus Fully Homomorphic Encryption), a scheme distinguished by fast bootstrapping—the fundamental operation that resets accumulated noise in ciphertexts and enables unlimited computation depth.

The fhEVM architecture introduces a symbolic execution model that elegantly solves blockchain's performance constraints. Rather than processing actual encrypted data on-chain, smart contracts execute using lightweight handles (pointers) while actual FHE computations are offloaded asynchronously to specialized coprocessors. This design means host chains like Ethereum require no modifications, non-FHE transactions experience no slowdown, and FHE operations can execute in parallel rather than sequentially. The architecture comprises five integrated components: the fhEVM library for Solidity developers, coprocessor nodes performing FHE computation, a Key Management Service using 13 MPC nodes with threshold decryption, an Access Control List contract for programmable privacy, and a Gateway orchestrating cross-chain operations.

Performance benchmarks demonstrate rapid improvement. Bootstrapping latency—the critical metric for FHE—dropped from 53 milliseconds initially to under 1 millisecond on NVIDIA H100 GPUs, with throughput reaching 189,000 bootstraps per second across eight H100s. Current protocol throughput stands at 20+ TPS on CPU, sufficient for all encrypted Ethereum transactions today. The roadmap projects 500-1,000 TPS by end of 2026 with GPU migration, scaling to 100,000+ TPS with dedicated ASICs in 2027-2028. Unlike TEE solutions vulnerable to hardware side-channel attacks, FHE's security rests on lattice-based cryptographic hardness assumptions that provide post-quantum resistance.


Developer tooling has matured from research to production

Zama's open-source ecosystem comprises four interconnected products that have attracted over 5,000 developers, representing approximately 70% market share in blockchain FHE. The TFHE-rs library provides a pure Rust implementation with GPU acceleration via CUDA, FPGA support through AMD Alveo hardware, and multi-level APIs ranging from high-level operations to core cryptographic primitives. The library supports encrypted integers up to 256 bits with operations including arithmetic, comparisons, and conditional branching.

Concrete functions as a TFHE compiler built on LLVM/MLIR infrastructure, transforming standard Python programs into FHE-equivalent circuits. Developers require no cryptography expertise—they write normal Python code and Concrete handles the complexity of circuit optimization, key generation, and ciphertext management. For machine learning applications, Concrete ML provides drop-in replacements for scikit-learn models that automatically compile to FHE circuits, supporting linear models, tree-based ensembles, and even encrypted LLM fine-tuning. Version 1.8 demonstrated fine-tuning a LLAMA 8B model on 100,000 encrypted tokens in approximately 70 hours.

The fhEVM Solidity library enables developers to write confidential smart contracts using familiar syntax with encrypted types (euint8 through euint256, ebool, eaddress). An encrypted ERC-20 transfer, for example, uses TFHE.le() to compare encrypted balances and TFHE.select() for conditional logic—all without revealing values. The September 2025 partnership with OpenZeppelin established standardized confidential token implementations, sealed-bid auction primitives, and governance frameworks that accelerate enterprise adoption.


Business model captures value as infrastructure provider

Zama's funding trajectory reflects accelerating institutional confidence: a $73 million Series A in March 2024 led by Multicoin Capital and Protocol Labs, followed by a $57 million Series B in June 2025 led by Pantera Capital that achieved unicorn status. The investor roster reads as blockchain royalty—Juan Benet (Filecoin founder and board member), Gavin Wood (Ethereum and Polkadot co-founder), Anatoly Yakovenko (Solana co-founder), and Tarun Chitra (Gauntlet founder) all participated.

The revenue model employs BSD3-Clear dual licensing: technologies remain free for non-commercial research and prototyping, while production deployment requires purchasing patent usage rights. By March 2024, Zama had signed over $50 million in contract value within six months of commercialization, with hundreds of additional customers in pipeline. Transaction-based pricing applies for private blockchain deployments, while crypto projects often pay in tokens. The upcoming Zama Protocol introduces on-chain economics: operators stake $ZAMA to qualify for encryption and decryption work, with fees ranging from $0.005 - $0.50 per ZKPoK verification and $0.001 - $0.10 per decryption operation.

The team represents the largest dedicated FHE research organization globally: 96+ employees across 26 nationalities, with 37 holding PhDs (~40% of staff). Co-founder and CTO Pascal Paillier invented the Paillier encryption scheme used in billions of smart cards and received the prestigious IACR Fellowship in 2025. CEO Rand Hindi previously founded Snips, an AI voice platform acquired by Sonos. This concentration of cryptographic talent creates substantial intellectual property moats—Paillier holds approximately 25 patent families protecting core innovations.


Competitive positioning as the picks-and-shovels play for blockchain privacy

The privacy solution landscape divides into three fundamental approaches, each with distinct trade-offs. Trusted Execution Environments (TEEs), used by Secret Network and Oasis Network, offer near-native performance but rely on hardware security with a trust threshold of one—if the enclave is compromised, all privacy breaks. The October 2022 disclosure of TEE vulnerabilities affecting Secret Network underscored these risks. Zero-Knowledge proofs, employed by Aztec Protocol ($100M Series B from a16z), prove computation correctness without revealing inputs but cannot compute on encrypted data from multiple parties—limiting their applicability for shared state applications like lending pools.

FHE occupies a unique position: mathematically guaranteed privacy with configurable trust thresholds, no hardware dependencies, and the crucial ability to process encrypted data from multiple sources. This enables use cases impossible with other approaches—confidential AMMs computing over encrypted reserves from liquidity providers, or lending protocols managing encrypted collateral positions.

Within FHE specifically, Zama operates as the infrastructure layer while others build chains on top. Fhenix ($22M raised) builds an optimistic rollup L2 using Zama's TFHE-rs via partnership, having deployed CoFHE coprocessor on Arbitrum as the first practical FHE implementation. Inco Network ($4.5M raised) provides confidentiality-as-a-service for existing chains using Zama's fhEVM, offering both TEE-based fast processing and FHE+MPC secure computation. Both projects depend on Zama's core technology—meaning Zama captures value regardless of which FHE chain gains dominance. This infrastructure positioning mirrors how OpenZeppelin profits from smart contract adoption without competing with Ethereum directly.


Use cases span DeFi, AI, RWAs, and compliant payments

In DeFi, FHE fundamentally solves MEV (Maximal Extractable Value). Because transaction parameters remain encrypted until block inclusion, front-running and sandwich attacks become mathematically impossible—there is simply no visible mempool data to exploit. The ZamaSwap reference implementation demonstrates encrypted AMM swaps with fully encrypted balances and pool reserves. Beyond MEV protection, confidential lending protocols can maintain encrypted collateral positions and liquidation thresholds, enabling on-chain credit scoring computed over private financial data.

For AI and machine learning, Concrete ML enables privacy-preserving computation across healthcare (encrypted medical diagnosis), finance (fraud detection on encrypted transactions), and biometrics (authentication without revealing identity). The framework supports encrypted LLM fine-tuning—training language models on sensitive data that never leaves encrypted form. As AI agents proliferate across Web3 infrastructure, FHE provides the confidential computation layer ensuring data privacy without sacrificing utility.

Real-World Asset tokenization represents perhaps the largest opportunity. The JP Morgan Kinexys Project EPIC proof-of-concept demonstrated institutional asset tokenization with encrypted bid amounts, hidden investor holdings, and KYC/AML checks on encrypted data—maintaining full regulatory compliance. This addresses the fundamental barrier preventing traditional finance from using public blockchains: the inability to hide trading strategies and positions from competitors. With tokenized RWAs projected as a $100+ trillion addressable market, FHE unlocks institutional participation that private blockchains cannot serve.

Payment and stablecoin privacy completes the picture. The December 2025 mainnet launch included the first confidential stablecoin transfer using cUSDT. Unlike mixing-based approaches (Tornado Cash), FHE enables programmable compliance—developers define access control rules determining who can decrypt what, enabling regulatory-compliant privacy rather than absolute anonymity. Authorized auditors and regulators receive appropriate access without compromising general transaction privacy.


Regulatory landscape creates tailwinds for compliant privacy

The EU's MiCA framework, fully effective since December 30, 2024, creates strong demand for privacy solutions that maintain compliance. The Travel Rule requires crypto asset service providers to share originator and beneficiary data for all transfers, with no de minimis threshold—making privacy-by-default approaches like mixing impractical. FHE's selective disclosure mechanisms align precisely with this requirement: transactions remain encrypted from general observation while authorized parties access necessary information.

In the United States, the July 2025 signing of the GENIUS Act established the first comprehensive federal stablecoin framework, signaling regulatory maturation that favors compliant privacy solutions over regulatory evasion. The Asia-Pacific region continues advancing progressive frameworks, with Hong Kong's stablecoin regulatory regime effective August 2025 and Singapore maintaining leadership in crypto licensing. Across jurisdictions, the pattern favors solutions enabling both privacy and regulatory compliance—precisely Zama's value proposition.

The 2025 enforcement shift from reactive prosecution to proactive frameworks creates opportunity for FHE adoption. Projects building with compliant privacy architectures from inception—rather than retrofitting privacy-first designs for compliance—will find easier paths to institutional adoption and regulatory approval.


Technical and market challenges require careful navigation

Performance remains the primary barrier, though the trajectory is clear. FHE operations currently run approximately 100x slower than plaintext equivalents—acceptable for low-frequency high-value transactions but constraining for high-throughput applications. The scaling roadmap depends on hardware acceleration: GPU migration in 2026, FPGA optimization, and ultimately purpose-built ASICs. The DARPA DPRIVE program funding Intel, Duality, SRI, and Niobium for FHE accelerator development represents significant government investment accelerating this timeline.

Key management introduces its own complexities. The current 13-node MPC committee for threshold decryption requires honest majority assumptions—collusion among threshold nodes could enable "silent attacks" undetectable by other participants. The roadmap targets expansion to 100+ nodes with HSM integration and post-quantum ZK proofs, strengthening these guarantees.

Competition from TEE and ZK alternatives should not be dismissed. Secret Network and Oasis offer production-ready confidential computing with substantially better current performance. Aztec's $100M backing and team that invented PLONK—the dominant ZK-SNARK construction—means formidable competition in privacy-preserving rollups. The TEE performance advantage may persist if hardware security improves faster than FHE acceleration, though hardware trust assumptions create a fundamental ceiling ZK and FHE solutions don't share.


Conclusion: Infrastructure positioning captures value across ecosystem growth

Zama's strategic genius lies in its positioning as infrastructure rather than competing chain. Both Fhenix and Inco—the leading FHE blockchain implementations—build on Zama's TFHE-rs and fhEVM technology, meaning Zama captures licensing revenue regardless of which protocol gains adoption. The dual licensing model ensures open-source developer adoption drives commercial enterprise demand, while the $ZAMA token launching in January 2026 creates on-chain economics aligning operator incentives with network growth.

Three factors will determine Zama's ultimate success: execution on the performance roadmap from 20 TPS today to 100,000+ TPS with ASICs; institutional adoption following the JP Morgan validation; and developer ecosystem growth beyond current 5,000 developers to mainstream Web3 penetration. The regulatory environment has shifted decisively in favor of compliant privacy, and FHE's unique capability for encrypted multi-party computation addresses use cases neither ZK nor TEE can serve.

For Web3 researchers and investors, Zama represents the canonical "picks and shovels" opportunity in blockchain privacy—infrastructure that captures value as the confidential computing layer matures across DeFi, AI, RWAs, and institutional adoption. The $1 billion valuation prices significant execution risk, but successful delivery of the technical roadmap could position Zama as essential infrastructure for the next decade of blockchain development.