About SIP

Privacy as a Feature

Building the privacy layer that cross-chain transactions deserve. Open source, auditable, and designed for compliance.

Why We Build SIP

In 2024, the ZachXBT incident exposed a critical vulnerability: transparent on-chain activity enables coordinated attacks on traders. Market makers, DAOs, and individuals all face risks when their transaction history is public.

SIP Protocol addresses this by bringing Zcash-level privacy to cross-chain transactions. Not as a separate chain, but as a privacy layer that works with the intent-based infrastructure you already use.

Our vision: privacy should be a toggle, not a tradeoff.

Privacy by Default

Financial privacy is a fundamental right. SIP makes it accessible with a single toggle, not a complex setup.

Application Layer

We complement existing infrastructure, not compete with it. SIP works with NEAR Intents and Zcash, not against them.

Compliance Ready

Privacy and compliance can coexist. Viewing keys enable selective disclosure for auditors and regulators.

How SIP Works

A privacy layer built on proven cryptographic primitives

User
Intent → Swap 1 ETH for SOL (shielded)
SIP Layer
Stealth Address
Hide recipient
Commitment
Hide amount
Viewing Key
Compliance
NEAR Intents
Solver Network → Best execution, no recipient knowledge
Settlement
ETH
SOL
NEAR
ZEC

NEAR Intents

We leverage NEAR's intent-based architecture and solver network for cross-chain execution. SIP adds privacy to intents without modifying the underlying infrastructure.

Zcash Cryptography

Battle-tested privacy primitives from Zcash: Pedersen commitments for hiding amounts, and techniques adapted from the shielded pool for transaction privacy.

Roadmap

Methodical progress toward production-ready privacy

M1Complete

Architecture & Specification

  • Protocol design
  • Threat modeling
  • Cryptographic specifications
M2Complete

Cryptographic Core

  • Pedersen commitments
  • Stealth addresses
  • Viewing key system
M3Complete

SDK Production

  • TypeScript SDK
  • Intent builder
  • Validation layer
M4Complete

Network Integration

  • NEAR Intents adapter
  • Wallet adapters
  • E2E test suite
M5Complete

Documentation & Launch

  • API documentation
  • Integration guides
  • Security audit prep
M6
M6Upcoming

ZK Circuits

  • Noir circuit implementation
  • Proof generation
  • Verification contracts

Community Driven

SIP Protocol is open source and built in public. We believe privacy technology should be transparent, auditable, and community-owned.

MIT Licensed
741 Tests
Security Audit Ready