Privacy Infrastructure · STARKs

Every asset.
Yours and sovereign.

Privacy and compliance infrastructure for institutional assets. Quantum-resistant. Self-custodial. Built to be impossible to break.

Quantum-Resistant Self-Custodial Sub-5s Proofs Selective Disclosure
Request Early Access Read the Docs →
Built on Starknet STWO Proofs Sub-5s Post-Quantum

Why Veil

The infrastructure
institutions have been waiting for.

Quantum-Resistant

Built on post-quantum cryptographic primitives. Designed to withstand the next generation of computational attacks — today.

Self-Custodial

You hold your keys. No trusted third party. No custodian with access to your assets. Sovereignty by design, not by policy.

Cheap & Fast

Sub-5 second proof generation. Near-zero gas costs on Starknet. Privacy that doesn't tax your operations or slow your execution.

Compliant

Selective disclosure via encrypted viewing keys. Prove ownership to regulators and auditors — without public exposure. Privacy and compliance are not opposites.


How it works

Transfer anything.
Prove what matters.
Expose nothing else.

01 — HIDE
Invisible by default

Asset, sender, and receiver are concealed from public view at the protocol level. The transfer executes on-chain. No observer can determine what moved, from whom, or to whom.

0x
Publicly visible data to third parties
02 — PROVE
Provable on demand

Cryptographic proofs allow ownership and compliance to be demonstrated to any authorized party — auditor, regulator, counterparty — without revealing anything beyond what is required.

<5s
Proof generation time
Cryptographic Foundation
STWO / Post-Quantum

Native to Starknet's STWO proving system. Not a retrofit. Built from the ground up for NFTs and real-world assets.

Custody Model
Non-Custodial

Keys never leave your control. No multisig with third parties. No counterparty risk in the custody layer.

Attack Surface
Mathematically Bounded

Security guarantees derive from mathematical hardness assumptions — not from operational trust or policy. Impossible to break without breaking the math.


Why Veil

Infrastructure-grade.
No compromises.

Built for Institutions

Encrypted viewing keys let auditors verify without exposing positions. Selective disclosure by design, not by workaround.

Sub-5 Second Proofs

STWO prover generates ZK proofs fast enough for real-world UX. Mobile-ready by late 2026.

Self-Custodial by Default

No trusted third party. No backdoors. Your keys, your assets, your proofs.


Landscape

The only solution
that does all of it.

Capability Veil STRK20 Aztec Railgun
Private NFTs / RWAs
Selective Compliance Disclosure
Sub-5s Proof Generation Partial
Quantum-Resistant
Self-Custodial Partial
Native to NFTs (not retrofitted)

"Institutions won't adopt public ledgers at scale
until privacy is provable, compliance is selective,
and custody is truly theirs."

— Veil Thesis, 2026

Every asset.
Yours and sovereign.

Veil is in active development. Early access for institutional partners and protocols.

Request Early Access Technical Docs →
Built on
Starknet StarkWare Dojo Cartridge