Binance Square

iExec RLC

image
Creatore verificato
Programmable Privacy for Web3.
0 Seguiti
2.8K+ Follower
2.0K+ Mi piace
257 Condivisioni
Post
PINNED
·
--
Visualizza traduzione
Public vaults expose positions, strategy, and flows by default. Introducing Confidential Vaults on @arbitrum_official testnet. ➡️https://cvault.demo.noxprotocol.io Encrypt what matters: ✅Encrypted balances & LP positions ✅Protect strategy & financial logic ✅Selective disclosure for auditors $RLC
Public vaults expose positions, strategy, and flows by default.

Introducing Confidential Vaults on @Finance_fx testnet.

➡️https://cvault.demo.noxprotocol.io

Encrypt what matters:
✅Encrypted balances & LP positions
✅Protect strategy & financial logic
✅Selective disclosure for auditors

$RLC
PINNED
Presentazione del Token Confidenziale iExec. Demo dal vivo su @arbitrum_official Sepolia. Mainnet presto. Sperimenta la Privacy Programmabile per Web3: ✅ Divulgazione selettiva ✅ Saldi crittografati ✅ Trasferimenti crittografati $RLC
Presentazione del Token Confidenziale iExec.
Demo dal vivo su @Finance_fx Sepolia.
Mainnet presto.

Sperimenta la Privacy Programmabile per Web3:
✅ Divulgazione selettiva
✅ Saldi crittografati
✅ Trasferimenti crittografati

$RLC
Articolo
Visualizza traduzione
The Confidential Vault: A Technical OverviewThe Confidential Vault: A Technical Overview Active strategy vaults are a proven category in on-chain asset management. ERC-7540 standardized the asynchronous vault model that institutional managers require: request-based deposits and redemptions, settlement cycles aligned with off-chain operations, and the lifecycle hooks needed for KYC and regulated workflows. What the category lacks is confidential execution. Every position, rebalancing decision, and routing choice is written to the public state on execution. Competitors observe it. MEV bots front-run it. Institutional LPs cannot meet mandate conditions that require position privacy. Regulators cannot be granted scoped access when the data is already public to everyone. iExec unlocked a new use case on Nox that addresses this directly: the Confidential Vault. It combines ERC-7540 with ERC-7984, the confidential token standard, into Confidential ERC-7540.  Encrypted state transitions execute inside Intel TDX-based Trusted Execution Environments (TEE), with on-chain attestation. Vault structure stays public. Position data stays encrypted. Disclosure is selective, scoped, and revocable. The Standards ERC-7540 is the asynchronous tokenized vault standard. A depositor submits a request deposit, the operator processes it during a settlement cycle, and the depositor calls deposit to claim shares once fulfilled. The same applies in reverse for redemptions. This is the model active strategy vaults and RWA vehicles already operate under. ERC-7984 is the confidential token standard. Balances are stored on-chain as ciphertext, encrypted data that appears as a meaningless string to anyone reading the chain, and can only be decrypted by parties holding the right access permissions. Transfers execute through encrypted operations, with no plaintext amount written to the public state. Holders read their own balance through a permissioned decryption path. Third parties observe ciphertext. Confidential ERC-7540 is one example of what Nox enables. It is ERC-7540 with a confidentiality layer applied through Nox. The vault follows the standard ERC-7540 lifecycle, and the ERC-7540 interface remains intact, so existing integrations continue to function without modification. The share token and accounting layer use ERC-7984 primitives, so balances and amounts stay encrypted on-chain. Public vs. Encrypted State?  Public: vault address and configuration, asset and share token references, fee parameters, the permission registry, request and settlement events, and the attestations from each TEE execution. Encrypted: per-LP balances, deposit and redemption amounts, position composition, intermediate strategy values, and reward computations prior to distribution. The vault remains structurally auditable. The amounts, positions, and strategy data behind each transition remain confidential. Execution Under Nox Confidential operations execute inside a Trusted Execution Environment provisioned by Nox. Intel TDX isolates the environment at the hardware level. Inputs are decrypted only inside the enclave, strategy logic executes on plaintext data within it, and encrypted outputs are returned to the chain alongside a cryptographic attestation. The vault contract verifies the attestation on-chain before any state update. The chain never sees plaintext. The chain has cryptographic evidence that the declared logic ran correctly on the committed inputs. No party, including iExec, has access to the enclave state. Confidential Primitives Vault developers do not implement cryptography. Nox ships the primitives directly: Encrypted balance accounting for share issuance, redemption, and transfer.Encrypted transfers that execute without exposing amounts on-chain.Access control on encrypted fields, enforced at the protocol layer per field and per address.Attested computation, verified on-chain before any state update. Builders integrate these as protocol calls. Vault Creator deploys the vault, registers the strategy logic measurement, sets fees, and manages the permission registry. Has no default visibility into LP positions; access requires an explicit permission entry. Liquidity Provider submits encrypted deposit and redemption requests. Can decrypt their own position and grant scoped read access to custodians, prime brokers, or counterparties. Permissions are revocable. Auditor / Regulator receives selective read access scoped to specific fields required by their mandate. Access is enforced cryptographically rather than by policy. Read access to one field does not extend to any other. Access is revocable. Selective disclosure is implemented at the protocol layer. The permission registry is an on-chain mapping from (address, field) to a decryption capability. Granting access writes an entry; revoking removes it. Reads against encrypted state are gated by the registry. This matches the disclosure model regulated funds already operate under: scoped access for auditors and counterparties on demand, without exposing the same data to the broader market. Compliance is configurable rather than structural. Two properties hold simultaneously after every execution. The chain has cryptographic evidence that the declared strategy logic was executed correctly, via the Intel TDX attestation. The chain does not have visibility into the plaintext inputs, intermediate values, or per-LP data. Counterparties verify behavior without observing the underlying data. This is the property that distinguishes the Confidential Vault from off-chain execution or off-chain custody. Confidentiality and on-chain verifiability are preserved together. What This Enables For active strategy managers, vault transparency stays in place to preserve trust, while strategy intelligence stays private. For RWA issuers and tokenized fund managers, position-level privacy and selective disclosure become available without operating outside the on-chain stack. For vault protocol builders, confidentiality plugs into existing ERC-7540 infrastructure as a capability rather than a rebuild. The Confidential Vault is a use case on Nox that resolves the structural constraint blocking confidential strategy execution on-chain. It is built on Confidential ERC-7540, combining the asynchronous vault standard with the confidential token standard. Disclosure is permissioned, scoped, and revocable. Vault structure stays public. Positions, amounts, and strategy logic stay encrypted. Regulators get the access they need. The market does not. Confidentiality is the missing primitive in on-chain finance. Powered by Nox, iExec is shipping it as a use case partners can build on today. Start here: https://cvault.demo.noxprotocol.io/ Let’s Chat: https://www.iex.ec/contact-us  $RLC

The Confidential Vault: A Technical Overview

The Confidential Vault: A Technical Overview
Active strategy vaults are a proven category in on-chain asset management. ERC-7540 standardized the asynchronous vault model that institutional managers require: request-based deposits and redemptions, settlement cycles aligned with off-chain operations, and the lifecycle hooks needed for KYC and regulated workflows.
What the category lacks is confidential execution. Every position, rebalancing decision, and routing choice is written to the public state on execution. Competitors observe it. MEV bots front-run it. Institutional LPs cannot meet mandate conditions that require position privacy. Regulators cannot be granted scoped access when the data is already public to everyone.
iExec unlocked a new use case on Nox that addresses this directly: the Confidential Vault. It combines ERC-7540 with ERC-7984, the confidential token standard, into Confidential ERC-7540. 
Encrypted state transitions execute inside Intel TDX-based Trusted Execution Environments (TEE), with on-chain attestation. Vault structure stays public. Position data stays encrypted. Disclosure is selective, scoped, and revocable.
The Standards
ERC-7540 is the asynchronous tokenized vault standard. A depositor submits a request deposit, the operator processes it during a settlement cycle, and the depositor calls deposit to claim shares once fulfilled. The same applies in reverse for redemptions. This is the model active strategy vaults and RWA vehicles already operate under.
ERC-7984 is the confidential token standard. Balances are stored on-chain as ciphertext, encrypted data that appears as a meaningless string to anyone reading the chain, and can only be decrypted by parties holding the right access permissions.
Transfers execute through encrypted operations, with no plaintext amount written to the public state.
Holders read their own balance through a permissioned decryption path.
Third parties observe ciphertext.
Confidential ERC-7540 is one example of what Nox enables. It is ERC-7540 with a confidentiality layer applied through Nox. The vault follows the standard ERC-7540 lifecycle, and the ERC-7540 interface remains intact, so existing integrations continue to function without modification. The share token and accounting layer use ERC-7984 primitives, so balances and amounts stay encrypted on-chain.
Public vs. Encrypted State? 
Public: vault address and configuration, asset and share token references, fee parameters, the permission registry, request and settlement events, and the attestations from each TEE execution.
Encrypted: per-LP balances, deposit and redemption amounts, position composition, intermediate strategy values, and reward computations prior to distribution.
The vault remains structurally auditable. The amounts, positions, and strategy data behind each transition remain confidential.
Execution Under Nox
Confidential operations execute inside a Trusted Execution Environment provisioned by Nox. Intel TDX isolates the environment at the hardware level. Inputs are decrypted only inside the enclave, strategy logic executes on plaintext data within it, and encrypted outputs are returned to the chain alongside a cryptographic attestation. The vault contract verifies the attestation on-chain before any state update.
The chain never sees plaintext. The chain has cryptographic evidence that the declared logic ran correctly on the committed inputs. No party, including iExec, has access to the enclave state.
Confidential Primitives
Vault developers do not implement cryptography. Nox ships the primitives directly:
Encrypted balance accounting for share issuance, redemption, and transfer.Encrypted transfers that execute without exposing amounts on-chain.Access control on encrypted fields, enforced at the protocol layer per field and per address.Attested computation, verified on-chain before any state update.
Builders integrate these as protocol calls.
Vault Creator deploys the vault, registers the strategy logic measurement, sets fees, and manages the permission registry. Has no default visibility into LP positions; access requires an explicit permission entry.
Liquidity Provider submits encrypted deposit and redemption requests. Can decrypt their own position and grant scoped read access to custodians, prime brokers, or counterparties. Permissions are revocable.
Auditor / Regulator receives selective read access scoped to specific fields required by their mandate. Access is enforced cryptographically rather than by policy. Read access to one field does not extend to any other. Access is revocable.
Selective disclosure is implemented at the protocol layer. The permission registry is an on-chain mapping from (address, field) to a decryption capability. Granting access writes an entry; revoking removes it. Reads against encrypted state are gated by the registry.
This matches the disclosure model regulated funds already operate under: scoped access for auditors and counterparties on demand, without exposing the same data to the broader market. Compliance is configurable rather than structural.
Two properties hold simultaneously after every execution. The chain has cryptographic evidence that the declared strategy logic was executed correctly, via the Intel TDX attestation. The chain does not have visibility into the plaintext inputs, intermediate values, or per-LP data. Counterparties verify behavior without observing the underlying data.
This is the property that distinguishes the Confidential Vault from off-chain execution or off-chain custody. Confidentiality and on-chain verifiability are preserved together.
What This Enables
For active strategy managers, vault transparency stays in place to preserve trust, while strategy intelligence stays private.
For RWA issuers and tokenized fund managers, position-level privacy and selective disclosure become available without operating outside the on-chain stack.
For vault protocol builders, confidentiality plugs into existing ERC-7540 infrastructure as a capability rather than a rebuild.

The Confidential Vault is a use case on Nox that resolves the structural constraint blocking confidential strategy execution on-chain. It is built on Confidential ERC-7540, combining the asynchronous vault standard with the confidential token standard. Disclosure is permissioned, scoped, and revocable.
Vault structure stays public. Positions, amounts, and strategy logic stay encrypted. Regulators get the access they need. The market does not.
Confidentiality is the missing primitive in on-chain finance. Powered by Nox, iExec is shipping it as a use case partners can build on today.
Start here: https://cvault.demo.noxprotocol.io/
Let’s Chat: https://www.iex.ec/contact-us 
$RLC
Visualizza traduzione
cDeFi gets mentioned a lot lately, but most people still don’t know what it means. Nathan Chiron joined HouseofChimera to break it down simply. $RLC
cDeFi gets mentioned a lot lately, but most people still don’t know what it means.

Nathan Chiron joined HouseofChimera to break it down simply.

$RLC
Visualizza traduzione
The ERC-7984 standard is the foundation of our Confidential Vault. Liquidity providers wrap their assets into Confidential Tokens upon entry, ensuring their positions stay private. When it’s time to exit, they simply unwrap. $RLC
The ERC-7984 standard is the foundation of our Confidential Vault.

Liquidity providers wrap their assets into Confidential Tokens upon entry, ensuring their positions stay private.

When it’s time to exit, they simply unwrap.

$RLC
Visualizza traduzione
Institutional strategies shouldn't be public knowledge. Protect your execution and positions while maintaining on-chain verifiability. Asset & Vault managers, explore the framework live on Arbitrum testnet : https://cvault.demo.noxprotocol.io $RLC
Institutional strategies shouldn't be public knowledge.

Protect your execution and positions while maintaining on-chain verifiability.

Asset & Vault managers, explore the framework live on Arbitrum testnet : https://cvault.demo.noxprotocol.io

$RLC
Visualizza traduzione
Privacy is about choosing what you reveal. The iExec Confidential Vault allows you to protect your strategy & data with encrypted positions, controlled access, and verified execution. Get started with programmable privacy at https://cvault.demo.noxprotocol.io $RLC
Privacy is about choosing what you reveal.

The iExec Confidential Vault allows you to protect your strategy & data with encrypted positions, controlled access, and verified execution.

Get started with programmable privacy at https://cvault.demo.noxprotocol.io

$RLC
Visualizza traduzione
Every person, company, and AI agent has sensitive data to process. At the same time, blockchains are fully transparent. Good conversation with House of Chimera about where privacy fits into all of this. $RLC
Every person, company, and AI agent has sensitive data to process.

At the same time, blockchains are fully transparent.

Good conversation with House of Chimera about where privacy fits into all of this.

$RLC
Visualizza traduzione
One word. The future of Privacy is ____ $RLC
One word.

The future of Privacy is ____

$RLC
La Vault Riservata consente un accesso selettivo e revocabile per auditor e regolatori. ➡️https://cvault.demo.noxprotocol.io $RLC
La Vault Riservata consente un accesso selettivo e revocabile per auditor e regolatori.

➡️https://cvault.demo.noxprotocol.io

$RLC
La verifica ora non richiede l'esposizione totale. L'architettura del Vault Confidenziale garantisce che solo i dati necessari per l'auditabilità rimangano pubblici. Tutto il resto, dalle posizioni alle strategie, è sotto il tuo controllo. $RLC
La verifica ora non richiede l'esposizione totale.

L'architettura del Vault Confidenziale garantisce che solo i dati necessari per l'auditabilità rimangano pubblici. Tutto il resto, dalle posizioni alle strategie, è sotto il tuo controllo.

$RLC
iExec RLC
·
--
Il Vault Riservato mostra dove sta andando il DeFi: privacy dove è importante, trasparenza dove il mercato ne ha bisogno.

$RLC
I dati RWA e DeFi richiedono un framework di privacy professionale. iExec vault utilizza cTokens per avvolgere gli asset, garantendo che l'esecuzione sia privata e crittograficamente provata. I creatori definiscono l'accesso, i partecipanti proteggono le loro posizioni, e i regolatori ottengono i dati di cui hanno bisogno. $RLC
I dati RWA e DeFi richiedono un framework di privacy professionale.

iExec vault utilizza cTokens per avvolgere gli asset, garantendo che l'esecuzione sia privata e crittograficamente provata.

I creatori definiscono l'accesso, i partecipanti proteggono le loro posizioni, e i regolatori ottengono i dati di cui hanno bisogno.

$RLC
Il Vault Confidenziale cambia il significato di depositare onchain. Avvolgendo i tuoi asset, la tua strategia di esecuzione rimane protetta dall'esposizione pubblica. Tieni i tuoi saldi e i flussi visibili solo a te e alle parti autorizzate. ➡   cvault.demo.noxprotocol.io $RLC
Il Vault Confidenziale cambia il significato di depositare onchain.

Avvolgendo i tuoi asset, la tua strategia di esecuzione rimane protetta dall'esposizione pubblica. Tieni i tuoi saldi e i flussi visibili solo a te e alle parti autorizzate.

➡   cvault.demo.noxprotocol.io

$RLC
Visualizza traduzione
Privacy can have different meanings based on the participant. For individuals, it’s personal safety. For institutions, it’s a strategic mandate: protecting trade secrets, meeting compliance requirements, and ensuring only the right auditors see sensitive data. https://www.iex.ec/ $RLC
Privacy can have different meanings based on the participant.

For individuals, it’s personal safety.

For institutions, it’s a strategic mandate: protecting trade secrets, meeting compliance requirements, and ensuring only the right auditors see sensitive data.

https://www.iex.ec/

$RLC
Visualizza traduzione
Use blockchain without exposing everything to competitors, bots, or the whole market.
Use blockchain without exposing everything to competitors, bots, or the whole market.
Visualizza traduzione
iExec $RLC is now live on TokenTerminal !💛 Providing a transparent look at our on chain metrics as we continue building the infrastructure for confidential assets. https://tokenterminal.com/explorer/projects/iexecrlc
iExec $RLC is now live on TokenTerminal !💛

Providing a transparent look at our on chain metrics as we continue building the infrastructure for confidential assets.

https://tokenterminal.com/explorer/projects/iexecrlc
✔️Implementa il tuo vault. ✔️Imposta i tuoi parametri. ✔️Controlla chi può vedere cosa. $RLC
✔️Implementa il tuo vault.
✔️Imposta i tuoi parametri.
✔️Controlla chi può vedere cosa.

$RLC
Visualizza traduzione
Asset management in vaults require transparency for trust. Your strategy can now stay private. The Confidential Vault protects your transactions from competitors and bots while maintaining credible and auditable. ➡️Start here: https://cvault.demo.noxprotocol.io $RLC
Asset management in vaults require transparency for trust.
Your strategy can now stay private.

The Confidential Vault protects your transactions from competitors and bots while maintaining credible and auditable.

➡️Start here: https://cvault.demo.noxprotocol.io

$RLC
Il Vault Riservato mostra dove sta andando il DeFi: privacy dove è importante, trasparenza dove il mercato ne ha bisogno. $RLC
Il Vault Riservato mostra dove sta andando il DeFi: privacy dove è importante, trasparenza dove il mercato ne ha bisogno.

$RLC
iExec RLC
·
--
Il Nuovo Standard per la Privacy nei Vault di Asset Gestiti
Il Nuovo Standard per la Privacy nei Vault di Asset Gestiti
Il mondo della Finanza Decentralizzata (DeFi) ha tradizionalmente operato su un principio di assoluta trasparenza. Anche se questa apertura è un pilastro fondamentale della blockchain, crea anche un ostacolo importante per gli investitori professionisti e i gestori di fondi che necessitano di privacy per operare in modo efficace.
Nel DeFi, un vault è un contratto intelligente che gestisce asset per più utenti. I vault passivi funzionano come semplici conti di risparmio, dove gli asset vengono depositati e il rendimento viene generato automaticamente. I vault a strategia attiva sono diversi. Si basano su manager professionisti che prendono decisioni, allocano capitale, riequilibrano i portafogli ed eseguono strategie.
Articolo
Il Nuovo Standard per la Privacy nei Vault di Asset GestitiIl Nuovo Standard per la Privacy nei Vault di Asset Gestiti Il mondo della Finanza Decentralizzata (DeFi) ha tradizionalmente operato su un principio di assoluta trasparenza. Anche se questa apertura è un pilastro fondamentale della blockchain, crea anche un ostacolo importante per gli investitori professionisti e i gestori di fondi che necessitano di privacy per operare in modo efficace. Nel DeFi, un vault è un contratto intelligente che gestisce asset per più utenti. I vault passivi funzionano come semplici conti di risparmio, dove gli asset vengono depositati e il rendimento viene generato automaticamente. I vault a strategia attiva sono diversi. Si basano su manager professionisti che prendono decisioni, allocano capitale, riequilibrano i portafogli ed eseguono strategie.

Il Nuovo Standard per la Privacy nei Vault di Asset Gestiti

Il Nuovo Standard per la Privacy nei Vault di Asset Gestiti
Il mondo della Finanza Decentralizzata (DeFi) ha tradizionalmente operato su un principio di assoluta trasparenza. Anche se questa apertura è un pilastro fondamentale della blockchain, crea anche un ostacolo importante per gli investitori professionisti e i gestori di fondi che necessitano di privacy per operare in modo efficace.
Nel DeFi, un vault è un contratto intelligente che gestisce asset per più utenti. I vault passivi funzionano come semplici conti di risparmio, dove gli asset vengono depositati e il rendimento viene generato automaticamente. I vault a strategia attiva sono diversi. Si basano su manager professionisti che prendono decisioni, allocano capitale, riequilibrano i portafogli ed eseguono strategie.
Accedi per esplorare altri contenuti
Unisciti agli utenti crypto globali su Binance Square
⚡️ Ottieni informazioni aggiornate e utili sulle crypto.
💬 Scelto dal più grande exchange crypto al mondo.
👍 Scopri approfondimenti autentici da creator verificati.
Email / numero di telefono
Mappa del sito
Preferenze sui cookie
T&C della piattaforma