Privacy as a Feature
Building the privacy layer that cross-chain transactions deserve. Open source, auditable, and designed for compliance.
Why We Build SIP
In 2024, the ZachXBT incident exposed a critical vulnerability: transparent on-chain activity enables coordinated attacks on traders. Market makers, DAOs, and individuals all face risks when their transaction history is public.
SIP Protocol addresses this by bringing Zcash-level privacy to cross-chain transactions. Not as a separate chain, but as a privacy layer that works with the intent-based infrastructure you already use.
Our vision: privacy should be a toggle, not a tradeoff.
Privacy by Default
Financial privacy is a fundamental right. SIP makes it accessible with a single toggle, not a complex setup.
Application Layer
We complement existing infrastructure, not compete with it. SIP works with NEAR Intents and Zcash, not against them.
Compliance Ready
Privacy and compliance can coexist. Viewing keys enable selective disclosure for auditors and regulators.
How SIP Works
A privacy layer built on proven cryptographic primitives
NEAR Intents
We leverage NEAR's intent-based architecture and solver network for cross-chain execution. SIP adds privacy to intents without modifying the underlying infrastructure.
Zcash Cryptography
Battle-tested privacy primitives from Zcash: Pedersen commitments for hiding amounts, and techniques adapted from the shielded pool for transaction privacy.
Roadmap
Methodical progress toward production-ready privacy
Architecture & Specification
- Protocol design
- Threat modeling
- Cryptographic specifications
Cryptographic Core
- Pedersen commitments
- Stealth addresses
- Viewing key system
SDK Production
- TypeScript SDK
- Intent builder
- Validation layer
Network Integration
- NEAR Intents adapter
- Wallet adapters
- E2E test suite
Documentation & Launch
- API documentation
- Integration guides
- Security audit prep
ZK Circuits
- Noir circuit implementation
- Proof generation
- Verification contracts
Community Driven
SIP Protocol is open source and built in public. We believe privacy technology should be transparent, auditable, and community-owned.