Skip to main content

Vendors & Protocols

This section provides vendor-neutral assessments of privacy infrastructure providers and protocol implementations. Each vendor page includes technical architecture, supported patterns, integration considerations, and deployment status.

Vendor Capability Matrix

VendorPrivacy ApproachMaturityKey Use Cases
AztecZK RollupProduction (Ignition)Private contracts, shielded transfers
FlashbotsMEV InfrastructureProductionPre-trade privacy, MEV protection
ShutterEncrypted MempoolProduction (Gnosis)MEV prevention, pre-trade privacy
PaladinModular Privacy LayerOpen SourceDvP, PvP, tokenized assets

Vendor Categories

Privacy L2s

Layer 2 networks with native privacy features

MEV Infrastructure

Pre-trade privacy and MEV protection solutions

Encrypted Mempools

Transaction privacy during broadcasting phase

Privacy Middleware

Modular privacy layers for existing chains

Selection Considerations

When evaluating privacy infrastructure: Technical Requirements
  • Privacy guarantees (pre-trade, execution, post-trade)
  • Cryptographic approach (ZK, MPC, TEE, encryption)
  • Performance characteristics (latency, throughput)
  • Integration complexity with existing systems
Operational Factors
  • Deployment model (L2, sidecar, middleware)
  • Network support (mainnet, L2s, private chains)
  • Key management and custody integration
  • Compliance and auditability features
Business Considerations
  • Production maturity and audit status
  • Developer tooling and documentation
  • Support and SLA availability
  • Licensing and commercial terms

Integration Patterns

Most vendors support one or more of these integration approaches:
  1. Native L2 Deployment - Deploy on privacy-focused rollup
  2. Sidecar Architecture - Privacy layer alongside existing EVM node
  3. Protocol Integration - Direct integration with protocol APIs
  4. Middleware Stack - Privacy as composable middleware layer

Build docs developers (and LLMs) love