Try SIP Protocol
Experience the difference between transparent and shielded transactions. Toggle privacy modes and see how your data is protected.
Full privacy via Zcash
Swap
Privacy Protected
Sender, amount, and recipient are hidden
Privacy Comparison
See what chain analysis can observe in each mode
Current System
ZachXBT Vulnerability
Transaction Flow
Problem: The same transparent address is reused for all refunds, linking shielded funds to public transactions.
Chain Analysis Can See:
- • Your wallet address
- • All transaction amounts
- • Complete transaction history
- • Linked shielded pool activity
With SIP Protocol
Privacy Protected
Transaction Flow
Solution: Each transaction uses a unique stealth address. No address reuse, no linkability.
Chain Analysis Can See:
- • Intent exists (not who created it)
- • Output requirements (not input amounts)
- • Nothing else - cryptographically enforced
How It Works
Create Intent
Your swap request is transformed into a shielded intent with hidden amounts using Pedersen commitments.
Generate Stealth Address
A unique one-time address is generated for the recipient, preventing transaction linkability.
Execute via Zcash
The transaction routes through Zcash's shielded pool, breaking the on-chain trail completely.
Ready to Integrate?
Add privacy to your dApp in minutes with our TypeScript SDK.