A consolidated view of PSE's highest-priority initiatives across Private Proving, Private Writes, and Private Reads.
Roadmaps are indicative and evolve with ecosystem feedback.
Make proving any data private and accessible.
Benchmark ZKP systems, bridge ecosystem gaps, push toward PQ-sound on-chain verification.
Mobile-first proving infrastructure. Native provers for Swift/Kotlin/RN/Flutter. GPU crypto libraries.
Privacy-preserving identity proofs. OpenAC wallet unit aligned with EUDI. ZK-friendly primitives.
Cryptographic proofs of web data authenticity using TLS and MPC. On track toward 1.0 release.
Standard interface for verifiable computation in WebAssembly. Enables private applications to run in secure, isolated environments and use WASM as a portable compilation target for zkVMs without coupling to a specific proving system.
Make private onchain actions as cheap and seamless as public ones.
Practical indistinguishability obfuscation. Roadmap through Q2 2027: blind PRF over key-homomorphic encodings, ≥64-bit obfuscation, SNARK verification, witness encryption.
Four-track Q2/Q3 2026 program: L1 Privacy (PQ-secure private ETH transfers), Lean Staking (EIP-8222), Sonobe folding library, and Plasmablind (maintenance).
Analyse protocols, measure gas cost of protocols, explore privacy standardisation
Institutional Privacy Task Force. PoCs, architecture reviews, workshops, market map.
Protect Ethereum users from leaking who they are and what they are reading from the Ethereum state.
PIR schemes tailored to the Ethereum hot state can and archival history, allowing users to read chain data from remote servers without revealing what is being queried. The sharded approach allows optimizing for different data types, contexts of usage, and tolerance to latency.
Pluggable abstraction over anonymization networks (onion nets, mixnets, or any other). The edge ([in-browser] wallets, SDKs, light-clients, ..) can swap networks without app-layer changes. The architecture and access/validation standard may be extended to accessing P2P networks generally.
Provably L1-equivalent execution-layer node that is running against a Unified Binary Tree (EIP-7864). PIR servers, wallets, and light clients can begin consuming binary-based state today ahead of EIP-7864 inclusion in protocol, while relying on equivalence proof for data validity.
Arti — Tor's official Rust client — compiled to WebAssembly. Anonymized RPC from wallets, frontends, and dApps, running entirely in the browser.