Binance Square

Brevis_ZK

image
Verified Creator
Brevis is the infinite compute layer for Web3. ZK-powered verifiable computing with hundreds of millions of proofs across 40 protocols.
1 Following
127 Followers
78 Liked
1 Shared
Posts
·
--
More than 300M proofs and it's not slowing down. 🔥 Verifiable compute is being used in production, every day, by teams pushing on-chain logic further. 🧠⚡ $BREV
More than 300M proofs and it's not slowing down. 🔥

Verifiable compute is being used in production, every day, by teams pushing on-chain logic further. 🧠⚡
$BREV
Brevis and APRO: Trust-Free Oracles and Trader Privacy for Prediction MarketsTL;DR: Brevis ($BREV ) is partnering with APRO, the leading oracle on BNB Chain, to develop trust-free oracle infrastructure and privacy-preserving services for prediction markets. The collaboration combines Brevis’s ZK Data Coprocessor, zkTLS, and Pico zkVM with APRO’s oracle network to enable cryptographically verified data feeds. Instead of relying solely on validator consensus, market outcomes can be resolved through mathematical proof. The partnership also builds privacy infrastructure for prediction market traders who need to protect their strategies, positions, and on-chain footprint. The Oracle Problem Prediction markets have exploded on BNB Chain, with platforms like our partner Opinion Labs driving billions in trading volume. But every prediction market faces the same challenge: how do you trustlessly resolve outcomes? Traditional oracles approach this through validator consensus. Multiple parties attest to real-world events, and the majority opinion becomes the on-chain truth. This works, but it introduces latency, cost, and trust assumptions. Validators can collude, disputes require complex arbitration, and for many data types, the “always-on” model of continuous feeds creates unnecessary overhead when markets only need resolution at specific moments. Brevis and APRO are exploring a different approach: oracles that prove their data mathematically rather than socially. Trust-Free Data for Three Categories The collaboration looks at three categories of data that prediction markets need, each with a distinct verification approach. On-Chain Historical Data Much of the data prediction markets need already exists on-chain, but smart contracts can’t access it efficiently. Questions like “What was the total trading volume on this protocol last week?” or “How many unique wallets interacted with this lending market?” are verifiable facts sitting on the blockchain. The problem is that answering them on-chain would cost prohibitive gas. Brevis’s ZK Data Coprocessor solves this by computing over historical blockchain state off-chain and generating cryptographic proofs that the computation is correct. The proof confirms that inputs came from authentic on-chain data and that the calculation followed the specified logic. Verification costs minimal gas, and no human intervention or validator quorum is required. Off-Chain Public Data For external events like economic indicators, sports outcomes, or news, the data originates from Web2 sources that aren’t natively verifiable on-chain. Traditional oracles rely on validators to attest that they observed specific content on a website. This introduces subjectivity and attack surfaces. Brevis’s zkTLS Coprocessor provides a cryptographic alternative. When fetching data from a web source, zkTLS proves that the content was retrieved through a genuine TLS session from the authentic domain, and that the data hasn’t been tampered with. Pico zkVM then parses the content to extract the relevant values. The result is a single-step resolution path: fetch the data, prove its authenticity, extract the value, verify on-chain. No multi-party vote required for uncontested facts. Off-Chain Private Data Some prediction markets depend on proprietary algorithms or confidential datasets. Mindshare metrics, sentiment indices, and internal analytics can’t be verified by traditional oracles because validators would need access to private logic. Brevis enables these use cases through ZK proofs. The data provider commits a hash of their algorithm on-chain, then publishes results alongside a proof that the output was generated from the committed logic without modification. Traders can verify that the result follows the stated methodology without seeing the underlying data or computation. This opens prediction markets to entirely new categories: proprietary indices, internal metrics, and algorithmic outputs that were previously impossible to trustlessly verify.  Across all three data categories, Brevis provides the verification layer that enables APRO to deliver trust-free oracle services. Data no longer requires validator attestation or reputation-based trust. Instead, the proof speaks for itself. Privacy for Prediction Market Traders Trust-free oracles are one pillar of the collaboration. Privacy-preserving infrastructure for prediction market participants is the other. Brevis and APRO have observed that large traders on prediction markets face a fundamental problem: the transparency that makes blockchains trustworthy also makes sophisticated participation risky. Without privacy, strategies leak, addresses get profiled, and large players become targets. The vulnerabilities span multiple dimensions: Trade Intentions When a trader’s directional bets become visible, they signal information to the market. Other participants can trade against known positions or front-run anticipated moves. Concealing trade intentions protects strategic advantage. Arbitrage Paths Traders exploiting price discrepancies across markets or protocols expose their methods when execution paths are public. Once an arbitrage strategy is visible, others can replicate it or compete for the same opportunities. Timing When a trader enters or exits positions often matters as much as the position itself. Visible timing patterns reveal strategy logic and enable others to anticipate future moves. Positions Open positions on public blockchains are visible to all participants. Competitors can see exposure levels, assess risk tolerance, and position themselves accordingly. Large traders become targets. Address Correlations On-chain activity links together across wallets and protocols. Even with multiple addresses, transaction patterns and fund flows can correlate identities. A trader’s complete history becomes a liability when addresses can be connected. Brevis addresses these through zero-knowledge proofs that separate validity from visibility. A trader can generate a proof that their transaction follows protocol rules and strategy constraints without revealing the specific execution path. The market verifies compliance without seeing the underlying activity. Identity and address information stay concealed while participation requirements are still provably met. For APRO’s prediction market partners, this means institutional-grade privacy on public infrastructure. Large traders can operate without exposing their intentions, strategies, positions, or on-chain footprint to competitors. A Vision of Verifiability and Privacy  The Brevis and APRO collaboration on trust-free oracles brings cryptographic verification to three categories of data: on-chain historical metrics through the ZK Data Coprocessor, off-chain public data through zkTLS, and off-chain private data through ZK computation proofs. Each replaces validator consensus with mathematical proof, making resolution faster, cheaper, and independently verifiable. The privacy work addresses the vulnerabilities that large prediction market traders face on transparent blockchains. ZK proofs let participants conceal their trade intentions, arbitrage paths, timing, positions, and address correlations while still proving their transactions are valid. Strategy leakage and address profiling become preventable problems rather than accepted costs. Together, these capabilities lay the groundwork for more sophisticated oracle and prediction market infrastructure on BNB Chain. Brevis and APRO are actively developing both, with more details to come as the work progresses. About Brevis Brevis is a verifiable computing platform powered by zero-knowledge proofs, serving as the infinite compute layer for Web3. Applications can offload expensive computations off-chain while proving every result on-chain. The Brevis stack includes Pico zkVM for general-purpose computation, the ZK Data Coprocessor for trustless access to historical blockchain data, Pico Prism for real-time Ethereum block proving (99.6% coverage, 6.9s average), and ProverNet, a decentralized marketplace for ZK proof generation. To date, Brevis has generated hundreds of millions of proofs across 40+ protocols on 6 blockchains.

Brevis and APRO: Trust-Free Oracles and Trader Privacy for Prediction Markets

TL;DR: Brevis ($BREV ) is partnering with APRO, the leading oracle on BNB Chain, to develop trust-free oracle infrastructure and privacy-preserving services for prediction markets. The collaboration combines Brevis’s ZK Data Coprocessor, zkTLS, and Pico zkVM with APRO’s oracle network to enable cryptographically verified data feeds. Instead of relying solely on validator consensus, market outcomes can be resolved through mathematical proof. The partnership also builds privacy infrastructure for prediction market traders who need to protect their strategies, positions, and on-chain footprint.
The Oracle Problem
Prediction markets have exploded on BNB Chain, with platforms like our partner Opinion Labs driving billions in trading volume. But every prediction market faces the same challenge: how do you trustlessly resolve outcomes?
Traditional oracles approach this through validator consensus. Multiple parties attest to real-world events, and the majority opinion becomes the on-chain truth. This works, but it introduces latency, cost, and trust assumptions. Validators can collude, disputes require complex arbitration, and for many data types, the “always-on” model of continuous feeds creates unnecessary overhead when markets only need resolution at specific moments.
Brevis and APRO are exploring a different approach: oracles that prove their data mathematically rather than socially.
Trust-Free Data for Three Categories
The collaboration looks at three categories of data that prediction markets need, each with a distinct verification approach.
On-Chain Historical Data
Much of the data prediction markets need already exists on-chain, but smart contracts can’t access it efficiently. Questions like “What was the total trading volume on this protocol last week?” or “How many unique wallets interacted with this lending market?” are verifiable facts sitting on the blockchain.
The problem is that answering them on-chain would cost prohibitive gas.
Brevis’s ZK Data Coprocessor solves this by computing over historical blockchain state off-chain and generating cryptographic proofs that the computation is correct. The proof confirms that inputs came from authentic on-chain data and that the calculation followed the specified logic. Verification costs minimal gas, and no human intervention or validator quorum is required.
Off-Chain Public Data
For external events like economic indicators, sports outcomes, or news, the data originates from Web2 sources that aren’t natively verifiable on-chain. Traditional oracles rely on validators to attest that they observed specific content on a website. This introduces subjectivity and attack surfaces.
Brevis’s zkTLS Coprocessor provides a cryptographic alternative. When fetching data from a web source, zkTLS proves that the content was retrieved through a genuine TLS session from the authentic domain, and that the data hasn’t been tampered with. Pico zkVM then parses the content to extract the relevant values.
The result is a single-step resolution path: fetch the data, prove its authenticity, extract the value, verify on-chain. No multi-party vote required for uncontested facts.
Off-Chain Private Data
Some prediction markets depend on proprietary algorithms or confidential datasets. Mindshare metrics, sentiment indices, and internal analytics can’t be verified by traditional oracles because validators would need access to private logic.
Brevis enables these use cases through ZK proofs. The data provider commits a hash of their algorithm on-chain, then publishes results alongside a proof that the output was generated from the committed logic without modification. Traders can verify that the result follows the stated methodology without seeing the underlying data or computation.
This opens prediction markets to entirely new categories: proprietary indices, internal metrics, and algorithmic outputs that were previously impossible to trustlessly verify. 
Across all three data categories, Brevis provides the verification layer that enables APRO to deliver trust-free oracle services. Data no longer requires validator attestation or reputation-based trust. Instead, the proof speaks for itself.
Privacy for Prediction Market Traders
Trust-free oracles are one pillar of the collaboration. Privacy-preserving infrastructure for prediction market participants is the other.
Brevis and APRO have observed that large traders on prediction markets face a fundamental problem: the transparency that makes blockchains trustworthy also makes sophisticated participation risky. Without privacy, strategies leak, addresses get profiled, and large players become targets.
The vulnerabilities span multiple dimensions:
Trade Intentions
When a trader’s directional bets become visible, they signal information to the market. Other participants can trade against known positions or front-run anticipated moves. Concealing trade intentions protects strategic advantage.
Arbitrage Paths
Traders exploiting price discrepancies across markets or protocols expose their methods when execution paths are public. Once an arbitrage strategy is visible, others can replicate it or compete for the same opportunities.
Timing
When a trader enters or exits positions often matters as much as the position itself. Visible timing patterns reveal strategy logic and enable others to anticipate future moves.
Positions
Open positions on public blockchains are visible to all participants. Competitors can see exposure levels, assess risk tolerance, and position themselves accordingly. Large traders become targets.
Address Correlations
On-chain activity links together across wallets and protocols. Even with multiple addresses, transaction patterns and fund flows can correlate identities. A trader’s complete history becomes a liability when addresses can be connected.
Brevis addresses these through zero-knowledge proofs that separate validity from visibility. A trader can generate a proof that their transaction follows protocol rules and strategy constraints without revealing the specific execution path. The market verifies compliance without seeing the underlying activity. Identity and address information stay concealed while participation requirements are still provably met.
For APRO’s prediction market partners, this means institutional-grade privacy on public infrastructure. Large traders can operate without exposing their intentions, strategies, positions, or on-chain footprint to competitors.
A Vision of Verifiability and Privacy 
The Brevis and APRO collaboration on trust-free oracles brings cryptographic verification to three categories of data: on-chain historical metrics through the ZK Data Coprocessor, off-chain public data through zkTLS, and off-chain private data through ZK computation proofs. Each replaces validator consensus with mathematical proof, making resolution faster, cheaper, and independently verifiable.
The privacy work addresses the vulnerabilities that large prediction market traders face on transparent blockchains. ZK proofs let participants conceal their trade intentions, arbitrage paths, timing, positions, and address correlations while still proving their transactions are valid. Strategy leakage and address profiling become preventable problems rather than accepted costs.
Together, these capabilities lay the groundwork for more sophisticated oracle and prediction market infrastructure on BNB Chain. Brevis and APRO are actively developing both, with more details to come as the work progresses.
About Brevis
Brevis is a verifiable computing platform powered by zero-knowledge proofs, serving as the infinite compute layer for Web3. Applications can offload expensive computations off-chain while proving every result on-chain. The Brevis stack includes Pico zkVM for general-purpose computation, the ZK Data Coprocessor for trustless access to historical blockchain data, Pico Prism for real-time Ethereum block proving (99.6% coverage, 6.9s average), and ProverNet, a decentralized marketplace for ZK proof generation. To date, Brevis has generated hundreds of millions of proofs across 40+ protocols on 6 blockchains.
Brevis, Primus, and Trendle: Building Verifiable Attention Markets on MonadTL;DR: Brevis ($BREV ) is partnering with Primus and Trendle to bring zero-knowledge verification to attention-based prediction markets on Monad. Trendle lets traders go long or short on social media mindshare. Primus provides zkTLS attestations proving data genuinely originates from X, Reddit, and YouTube. Brevis’s Pico zkVM verifiably calculates Trendle’s attention index on the attested data. Together, the three teams are building a prediction market for attention where every index calculation is cryptographically verified end-to-end. Prediction Markets Meet AttentionFi Attention has become a tradable asset. Platforms like Kaito have shown that social mindshare can be quantified and financialized. Prediction markets have proven that crowds can price information more accurately than experts. Trendle offers a combination of both: a perpetual-style prediction market on Monad where traders speculate on attention itself. Traders take positions on whether attention toward a topic will rise or fall, measured through an “Attention Index” that aggregates engagement signals across X, Reddit, and YouTube. The index tracks metrics like retweet counts, Reddit post scores, YouTube views, and comment velocity. It applies normalization, time-decay weighting, and quantile clipping to produce a single “Dollar of Attention” (DoA) value for each topic, with calculations running every minute over a rolling context window. Traders can go long if they believe a topic is gaining mindshare, or short if they think attention has peaked. Leverage up to 5x is available, with funding rates that penalize positions that lead to deviation from the index, creating incentives for contrarian views when narratives become overextended.  The mechanics work, but the question is whether traders can trust the index. The Trust Problem in Attention Markets When real money rides on an attention index, users need confidence that the underlying data is authentic and the calculations are correct. Traditional approaches rely on centralized oracles or trusted operators, but the data that drives Trendle’s index comes from Web2 platforms that aren’t natively verifiable on-chain.  How do you know the social metrics are real? How do you know the calculations weren’t manipulated? Trendle’s multi-source approach already makes manipulation on the source data harder. Gaming engagement across X, Reddit, and YouTube simultaneously is expensive and difficult to sustain. But data sources are not the only vector susceptible to manipulation. We must also ensure legitimacy of the entire pipeline that moves these data points on-chain as an aggregated index. This is where zero-knowledge proofs change the equation. The Technical Vision: zkTLS + Pico zkVM Brevis, Primus, and Trendle are collaborating on an architecture that makes the entire attention index pipeline verifiable, from data collection to on-chain settlement. The first challenge is proving that social data genuinely comes from the claimed sources. Primus, a long-time Brevis partner specializing in zkTLS technology, provides the solution. zkTLS extends standard TLS encryption with zero-knowledge proofs. When Trendle pulls engagement data from X, Reddit, or YouTube, Primus attestors witness the encrypted connection and generate cryptographic proof that the data originated from the authentic source. No tampering and no fabrication. The attestation travels with the data into the next stage. With verified input data, Brevis’s Pico zkVM handles the computation, allowing Trendle’s attention index algorithm to run inside the zkVM. The entire calculation produces a ZK proof alongside the result. This proof is compact and cheap to verify on-chain. It confirms that the output index value was correctly computed from the attested input data according to the published algorithm.  Anyone can verify it, no one needs to trust the operator. The final index value and its proof are submitted to Trendle’s smart contracts on Monad. The contract verifies the proof and uses the index to settle positions. From data collection to market settlement, the entire pipeline carries cryptographic guarantees. What This Means for Attention Markets Verifiable attention indexes unlock capabilities that weren’t previously possible. Traders no longer need to trust Trendle, Primus, Brevis, or any third party, the math proves itself. Disputes about index accuracy become cryptographically resolvable rather than dependent on reputation or arbitration. A verified attention index also becomes a building block for other protocols. DeFi applications, governance systems, or content platforms could consume Trendle’s index as a trust-minimized signal for attention-based mechanics. The combination of multi-source data, zkTLS attestation, and verifiable computation creates layered defenses against manipulation. Attackers would need to simultaneously game multiple platforms, compromise cryptographic attestation, and find flaws in ZK circuits. The cost of manipulation scales dramatically compared to traditional oracle-based approaches. Brevis Expands to Monad This partnership marks Brevis’s expansion to Monad, adding another high-performance chain to our supported networks. Monad’s parallel execution architecture makes it well-suited for applications like Trendle that require frequent on-chain updates and fast settlement. Brevis’s full ZK infrastructure, including Pico zkVM and zkTLS integrations, will be a great addition to Monad developers building data-intensive applications. What’s Next The Brevis, Primus, and Trendle teams are actively working toward integration. As AttentionFi matures, verifiability will separate sustainable platforms from those vulnerable to manipulation and disputes. This partnership establishes the technical direction: attention markets backed by cryptographic proof rather than trust assumptions. About Brevis Brevis is a verifiable computing platform powered by zero-knowledge proofs, serving as the infinite compute layer for Web3. Applications can offload expensive computations off-chain while proving every result on-chain. The Brevis stack includes Pico zkVM for general-purpose computation, the ZK Data Coprocessor for trustless access to historical blockchain data, Pico Prism for real-time Ethereum block proving (99.6% coverage, 6.9s average), and ProverNet, a decentralized marketplace for ZK proof generation. To date, Brevis has generated hundreds of millions of proofs across 40+ protocols on 6 blockchains.

Brevis, Primus, and Trendle: Building Verifiable Attention Markets on Monad

TL;DR: Brevis ($BREV ) is partnering with Primus and Trendle to bring zero-knowledge verification to attention-based prediction markets on Monad. Trendle lets traders go long or short on social media mindshare. Primus provides zkTLS attestations proving data genuinely originates from X, Reddit, and YouTube. Brevis’s Pico zkVM verifiably calculates Trendle’s attention index on the attested data. Together, the three teams are building a prediction market for attention where every index calculation is cryptographically verified end-to-end.
Prediction Markets Meet AttentionFi
Attention has become a tradable asset. Platforms like Kaito have shown that social mindshare can be quantified and financialized. Prediction markets have proven that crowds can price information more accurately than experts. Trendle offers a combination of both: a perpetual-style prediction market on Monad where traders speculate on attention itself.
Traders take positions on whether attention toward a topic will rise or fall, measured through an “Attention Index” that aggregates engagement signals across X, Reddit, and YouTube. The index tracks metrics like retweet counts, Reddit post scores, YouTube views, and comment velocity. It applies normalization, time-decay weighting, and quantile clipping to produce a single “Dollar of Attention” (DoA) value for each topic, with calculations running every minute over a rolling context window.
Traders can go long if they believe a topic is gaining mindshare, or short if they think attention has peaked. Leverage up to 5x is available, with funding rates that penalize positions that lead to deviation from the index, creating incentives for contrarian views when narratives become overextended. 
The mechanics work, but the question is whether traders can trust the index.
The Trust Problem in Attention Markets
When real money rides on an attention index, users need confidence that the underlying data is authentic and the calculations are correct. Traditional approaches rely on centralized oracles or trusted operators, but the data that drives Trendle’s index comes from Web2 platforms that aren’t natively verifiable on-chain. 
How do you know the social metrics are real? How do you know the calculations weren’t manipulated?
Trendle’s multi-source approach already makes manipulation on the source data harder. Gaming engagement across X, Reddit, and YouTube simultaneously is expensive and difficult to sustain. But data sources are not the only vector susceptible to manipulation. We must also ensure legitimacy of the entire pipeline that moves these data points on-chain as an aggregated index.
This is where zero-knowledge proofs change the equation.
The Technical Vision: zkTLS + Pico zkVM
Brevis, Primus, and Trendle are collaborating on an architecture that makes the entire attention index pipeline verifiable, from data collection to on-chain settlement.
The first challenge is proving that social data genuinely comes from the claimed sources. Primus, a long-time Brevis partner specializing in zkTLS technology, provides the solution. zkTLS extends standard TLS encryption with zero-knowledge proofs. When Trendle pulls engagement data from X, Reddit, or YouTube, Primus attestors witness the encrypted connection and generate cryptographic proof that the data originated from the authentic source. No tampering and no fabrication. The attestation travels with the data into the next stage.
With verified input data, Brevis’s Pico zkVM handles the computation, allowing Trendle’s attention index algorithm to run inside the zkVM. The entire calculation produces a ZK proof alongside the result. This proof is compact and cheap to verify on-chain. It confirms that the output index value was correctly computed from the attested input data according to the published algorithm. 
Anyone can verify it, no one needs to trust the operator.
The final index value and its proof are submitted to Trendle’s smart contracts on Monad. The contract verifies the proof and uses the index to settle positions.
From data collection to market settlement, the entire pipeline carries cryptographic guarantees.
What This Means for Attention Markets
Verifiable attention indexes unlock capabilities that weren’t previously possible.
Traders no longer need to trust Trendle, Primus, Brevis, or any third party, the math proves itself. Disputes about index accuracy become cryptographically resolvable rather than dependent on reputation or arbitration. A verified attention index also becomes a building block for other protocols. DeFi applications, governance systems, or content platforms could consume Trendle’s index as a trust-minimized signal for attention-based mechanics.
The combination of multi-source data, zkTLS attestation, and verifiable computation creates layered defenses against manipulation. Attackers would need to simultaneously game multiple platforms, compromise cryptographic attestation, and find flaws in ZK circuits. The cost of manipulation scales dramatically compared to traditional oracle-based approaches.
Brevis Expands to Monad
This partnership marks Brevis’s expansion to Monad, adding another high-performance chain to our supported networks. Monad’s parallel execution architecture makes it well-suited for applications like Trendle that require frequent on-chain updates and fast settlement.
Brevis’s full ZK infrastructure, including Pico zkVM and zkTLS integrations, will be a great addition to Monad developers building data-intensive applications.
What’s Next
The Brevis, Primus, and Trendle teams are actively working toward integration. As AttentionFi matures, verifiability will separate sustainable platforms from those vulnerable to manipulation and disputes. This partnership establishes the technical direction: attention markets backed by cryptographic proof rather than trust assumptions.
About Brevis
Brevis is a verifiable computing platform powered by zero-knowledge proofs, serving as the infinite compute layer for Web3. Applications can offload expensive computations off-chain while proving every result on-chain. The Brevis stack includes Pico zkVM for general-purpose computation, the ZK Data Coprocessor for trustless access to historical blockchain data, Pico Prism for real-time Ethereum block proving (99.6% coverage, 6.9s average), and ProverNet, a decentralized marketplace for ZK proof generation. To date, Brevis has generated hundreds of millions of proofs across 40+ protocols on 6 blockchains.
Brevis and USD8: Trustless Insurance for DeFiTL;DR: Brevis ($BREV ) is partnering with USD8, a stablecoin protocol with built-in DeFi insurance. USD8 users build “Cover Scores” based on their holding history, which determine payout eligibility when covered protocols experience losses. Brevis will compute these time-weighted average holdings using zero-knowledge proofs, making insurance payouts fully trustless and removing reliance on centralized infrastructure. DeFi Insurance That Works Like Usage History USD8 is a stablecoin designed around a simple premise: the more you use it, the more protection you get. Users who hold USD8 or deposit into USD8-supported vaults accumulate a “Cover Score” based on their time-weighted average holdings. If a covered DeFi protocol suffers a hack or depeg event, users can claim from USD8’s Cover Pool proportional to their score. Payouts can reach up to 80% of covered positions. The protocol operates through two tranches:  The Cover Pool offers higher yields generated through protocol-managed strategies over USD8 and its collateral, but assets may be deployed to cover losses. The Protected Savings vault offers lower yields with positions insured by the Cover Pool.  Users choose their risk tolerance; the protocol handles the rest. USD8 plans to launch coverage for major protocols including Aave, Curve, Lido, Sky, and others, with a beta targeted for Q2. Why Insurance Payouts Need ZK Verification The Cover Score is central to USD8’s design. It determines who gets paid and how much.  Without ZK verification, computing Cover Scores would require a centralized server with access to trigger payouts on-chain. The pipeline would look like:  user requests claim → centralized server calculates eligibility → server triggers on-chain distribution Even users who interact directly with contracts would depend on that server to process their claims. This creates a single point of failure. If the server goes offline or the team disappears, users lose access to the insurance they’ve been building toward. Vitalik Buterin calls this the “walk-away test”: can a protocol continue functioning if its creators vanish? For insurance, passing this test is essential. Users need confidence that their coverage will be honored regardless of what happens to the team behind it. How Brevis Enables Trustless Payouts Brevis ProverNet replaces the centralized server entirely. When a user requests a claim, ProverNet computes their eligible time-weighted average holdings of USD8 and relevant derivative assets, generating a zero-knowledge proof that the Cover Score was calculated correctly from actual on-chain data. The result is submitted directly to USD8’s payout contract for verification and distribution. No centralized server required, no trusted party determining eligibility, the proof itself guarantees correctness, and anyone can verify it independently. The entire payout pipeline becomes automated and trustless. This approach also eliminates manipulation vectors. Cover Scores determine real money payouts, which creates incentive for gaming. ZK verification ensures that every score reflects genuine holding history rather than fabricated data. Building Trustless Insurance Infrastructure USD8 represents a new category for Brevis: protocols where trustless computation directly protects user funds. The same ZK verification that powers trading fee discounts and reward distributions can secure insurance payouts worth potentially millions. As USD8 expands coverage to more protocols and the Cover Pool grows, the importance of trustless computation scales with it. Brevis and USD8 are collaborating on this infrastructure layer, with integration details to follow as the protocol approaches its beta launch in Q2 2026. About Brevis Brevis is a verifiable computing platform powered by zero-knowledge proofs, serving as the infinite compute layer for Web3. Applications can offload expensive computations off-chain while proving every result on-chain. The Brevis stack includes Pico zkVM for general-purpose computation, the ZK Data Coprocessor for trustless access to historical blockchain data, Pico Prism for real-time Ethereum block proving (99.6% coverage, 6.9s average), and ProverNet, a decentralized marketplace for ZK proof generation. To date, Brevis has generated hundreds of millions of proofs across 40+ protocols on 6 blockchains.

Brevis and USD8: Trustless Insurance for DeFi

TL;DR: Brevis ($BREV ) is partnering with USD8, a stablecoin protocol with built-in DeFi insurance. USD8 users build “Cover Scores” based on their holding history, which determine payout eligibility when covered protocols experience losses. Brevis will compute these time-weighted average holdings using zero-knowledge proofs, making insurance payouts fully trustless and removing reliance on centralized infrastructure.
DeFi Insurance That Works Like Usage History
USD8 is a stablecoin designed around a simple premise: the more you use it, the more protection you get.
Users who hold USD8 or deposit into USD8-supported vaults accumulate a “Cover Score” based on their time-weighted average holdings. If a covered DeFi protocol suffers a hack or depeg event, users can claim from USD8’s Cover Pool proportional to their score. Payouts can reach up to 80% of covered positions.
The protocol operates through two tranches: 
The Cover Pool offers higher yields generated through protocol-managed strategies over USD8 and its collateral, but assets may be deployed to cover losses. The Protected Savings vault offers lower yields with positions insured by the Cover Pool. 
Users choose their risk tolerance; the protocol handles the rest.
USD8 plans to launch coverage for major protocols including Aave, Curve, Lido, Sky, and others, with a beta targeted for Q2.
Why Insurance Payouts Need ZK Verification
The Cover Score is central to USD8’s design. It determines who gets paid and how much. 
Without ZK verification, computing Cover Scores would require a centralized server with access to trigger payouts on-chain. The pipeline would look like: 
user requests claim → centralized server calculates eligibility → server triggers on-chain distribution
Even users who interact directly with contracts would depend on that server to process their claims. This creates a single point of failure. If the server goes offline or the team disappears, users lose access to the insurance they’ve been building toward.
Vitalik Buterin calls this the “walk-away test”: can a protocol continue functioning if its creators vanish? For insurance, passing this test is essential. Users need confidence that their coverage will be honored regardless of what happens to the team behind it.
How Brevis Enables Trustless Payouts
Brevis ProverNet replaces the centralized server entirely.
When a user requests a claim, ProverNet computes their eligible time-weighted average holdings of USD8 and relevant derivative assets, generating a zero-knowledge proof that the Cover Score was calculated correctly from actual on-chain data. The result is submitted directly to USD8’s payout contract for verification and distribution.
No centralized server required, no trusted party determining eligibility, the proof itself guarantees correctness, and anyone can verify it independently. The entire payout pipeline becomes automated and trustless.
This approach also eliminates manipulation vectors. Cover Scores determine real money payouts, which creates incentive for gaming. ZK verification ensures that every score reflects genuine holding history rather than fabricated data.
Building Trustless Insurance Infrastructure
USD8 represents a new category for Brevis: protocols where trustless computation directly protects user funds. The same ZK verification that powers trading fee discounts and reward distributions can secure insurance payouts worth potentially millions.
As USD8 expands coverage to more protocols and the Cover Pool grows, the importance of trustless computation scales with it. Brevis and USD8 are collaborating on this infrastructure layer, with integration details to follow as the protocol approaches its beta launch in Q2 2026.
About Brevis
Brevis is a verifiable computing platform powered by zero-knowledge proofs, serving as the infinite compute layer for Web3. Applications can offload expensive computations off-chain while proving every result on-chain. The Brevis stack includes Pico zkVM for general-purpose computation, the ZK Data Coprocessor for trustless access to historical blockchain data, Pico Prism for real-time Ethereum block proving (99.6% coverage, 6.9s average), and ProverNet, a decentralized marketplace for ZK proof generation. To date, Brevis has generated hundreds of millions of proofs across 40+ protocols on 6 blockchains.
Brevis x BNB Chain: Redefining Privacy Infrastructure for Web3TL;DR: Brevis ($BREV ) and BNB Chain are expanding their collaboration into privacy infrastructure, building toward a generalized framework that goes far beyond first-generation transaction privacy. The three-dimensional design space we’re developing covers what gets protected, how it can be revealed, and who gets access. First concrete implementation: an Intelligent Privacy Pool built in collaboration with 0xbow where users prove compliance through ZK-verified on-chain behavior or exchange account status before transacting privately. The pool will launch on BNB Chain in Q1 2026. Rethinking Privacy in Crypto When most people hear “crypto privacy,” their minds go to a specific set of tools like Zcash, Tornado Cash, Railgun. These are systems designed to hide who sent what to whom. These tools work and serve an important purpose, but they were built with first-generation zero-knowledge technology, which was computationally limited and could only handle simple operations. That meant payment privacy was about hiding transactions and not much else.  You couldn’t easily control who uses the system, you couldn’t verify anything about a user’s history or status without breaking their privacy, and you couldn’t build in compliance pathways or configurable access rules. The technology simply wasn’t there yet. Today it is.  Modern zero-knowledge technology has expanded what’s actually possible, and the design space is now dramatically larger than “hide all token transfers.” Payment privacy can now evolve into something far more intelligent and configurable than before. And entirely new categories of privacy applications are also emerging. Understanding this expanded design space requires a new mental model. Three Dimensions of Privacy A better way to understand privacy systems is to think in three dimensions, and most interesting applications involve choices along all three. Privacy target: what exactly is being protected? Transaction counterparties and amounts are the traditional focus, but the target could also be: User attributes: wallet history, exchange activity, reputation signalsSensitive data: AI model weights, trading intent, preference profilesComputation processes: algorithm logic, inference steps, scoring mechanisms For example, a system might shield your wallet address while still proving properties about your on-chain history (such as that you’ve held a token for six months without revealing which wallet is yours). Another might hide the logic of a matching algorithm while making its outputs publicly verifiable, so traders can trust the results without seeing how they were computed. Unmasking protocol: how can protected information be revealed? This is where things get interesting from a security and trust-level perspective, because different systems make very different choices about who can access what’s hidden and under what conditions. Some designs ensure only the user can ever reveal the protected information, while others allow a centralized operator or a committee to unmask under defined governance conditions. Some build in pathways for regulatory authorities to compel disclosure, or use hardware attestation that reveals under specific technical constraints. This dimension determines trust boundaries and shapes compliance posture in ways that matter enormously for real-world adoption. Target users: who can use the privacy mechanism? Some systems offer permissionless access to everyone, while others restrict based on criteria like KYC status, on-chain history, attestations, or membership in verified sets. You might need to prove something about yourself to gain access, which sounds paradoxical but makes sense when you think about it. You can prove you belong to a group of verified users without revealing which specific member you are. Together, these three dimensions define a design space far richer than “transactions are either visible or hidden.“ What This Unlocks Once you start thinking about privacy in terms of these new dimensions, a much wider range of applications comes into view. While the first generation of privacy tools asked the single question of whether a transaction could be hidden, the expanded design space looks at what needs protecting, who should be able to reveal what information, and who should have access in the first place. This shift in framing opens up use cases that would have seemed impossible under the old model. Here are a few examples we think represent where things are headed. Private credential verification for social platforms. You might want to prove you’re a long-term holder or active DeFi user to boost your reputation on a platform, but linking your wallet publicly exposes your entire portfolio and history. With the right privacy design, you can verify credentials while keeping your wallet private. Compliant private transactions gated by verified association. Traditional mixers have a reputation problem because anyone can enter, including bad actors. A better model uses ZK to gate access: users prove they belong to a trusted set before entering, for instance by demonstrating they’re long-term exchange users with strong trading history and clean behavioral profile. Prediction markets on private algorithms. When a platform publishes sentiment or mindshare scores that determine market outcomes, how do traders know those calculations weren’t manipulated? ZK verification lets platforms prove every algorithm run was executed faithfully while keeping the methodology private. Privacy-preserving data for AI training. AI is at the limits of public-domain data. ZK solves this by letting users compute summaries over their private data and publish only the results with a proof that verifies both the origin and correctness. The common thread across all of these is that they combine choices along all three dimensions. What’s being protected varies. Who can unmask varies. Who gets access varies. But they’re all drawing from the same expanded design space that first-generation privacy tools couldn’t touch. Toward a Generalized Privacy Framework Look across those applications and a clear pattern emerges. They’re solving different problems for different users, but they’re drawing from the same underlying toolkit: attestations about user attributes, verifiable computation over private inputs, selective disclosure mechanisms. The primitives are shared even when the configurations differ. This points toward shared infrastructure rather than bespoke systems: attestation registries where proofs get generated once and reused across applications, computational privacy frameworks for verifiable off-chain execution, and transactional privacy toolkits that make deploying compliant privacy pools more like configuration than research. The three-dimensional framework maps directly onto what this infrastructure needs to provide. Targets, unmasking protocols, and access controls become the core primitives for a new infrastructure layer. First Step: Intelligent Privacy Pool on BNB Chain To demonstrate what this looks like in practice, Brevis and BNB Chain are collaborating with 0xbow to build an Intelligent Privacy Pool as the first concrete application. The basic function builds on 0xbow’s Privacy Pools core functionalities: deposit assets, withdraw to a new address without an on-chain link between them. The pool is able to maintain an Association Set of deposits that meet compliance criteria. Only deposits in this set can be withdrawn privately. What makes it different is how this Association Set is defined and implemented. Users prove eligibility of their deposits through one of two paths: on-chain provenance (proving funds originated from compliant sources via the Brevis ZK Data Coprocessor) or off-chain KYC binding (proving control of a verified exchange account, such as Binance, via zkTLS without revealing identity). Both paths use ZK proofs to verify eligibility without exposing sensitive data and relying on third-party trusts. If a deposit is later flagged by sanctions or associated with malicious activity, it can be removed from the Association Set, blocking further withdrawals. This provides controlled unmasking for legitimate enforcement needs. This is payment privacy, but implemented across all three dimensions: information privacy through proving attributes without revealing identity, transactional privacy through unlinkable deposits and withdrawals, and configurable access controls with removal pathways for edge cases. It shows what becomes possible when you apply the full design space to even the most familiar use case. What Comes Next The Intelligent Privacy Pool shows that the generalized framework works and that compliant privacy applications can be built using shared primitives. The old framing of crypto privacy was limited by the technology available at the time. Now that limitation is gone. Privacy is a design space where what gets protected, how it can be revealed, and who gets access combine to enable entirely new categories of applications, and to make existing categories far more powerful. Brevis, 0xbow, and BNB Chain are building toward that future together. About Brevis Brevis is a verifiable computing platform powered by zero-knowledge proofs, serving as the infinite compute layer for Web3. Applications can offload expensive computations off-chain while proving every result on-chain. The Brevis stack includes Pico zkVM for general-purpose computation, the ZK Data Coprocessor for trustless access to historical blockchain data, Pico Prism for real-time Ethereum block proving (99.6% coverage, 6.9s average), and ProverNet, a decentralized marketplace for ZK proof generation. To date, Brevis has generated hundreds of millions of proofs across 40+ protocols on 6 blockchains.

Brevis x BNB Chain: Redefining Privacy Infrastructure for Web3

TL;DR: Brevis ($BREV ) and BNB Chain are expanding their collaboration into privacy infrastructure, building toward a generalized framework that goes far beyond first-generation transaction privacy. The three-dimensional design space we’re developing covers what gets protected, how it can be revealed, and who gets access. First concrete implementation: an Intelligent Privacy Pool built in collaboration with 0xbow where users prove compliance through ZK-verified on-chain behavior or exchange account status before transacting privately. The pool will launch on BNB Chain in Q1 2026.
Rethinking Privacy in Crypto
When most people hear “crypto privacy,” their minds go to a specific set of tools like Zcash, Tornado Cash, Railgun. These are systems designed to hide who sent what to whom.
These tools work and serve an important purpose, but they were built with first-generation zero-knowledge technology, which was computationally limited and could only handle simple operations. That meant payment privacy was about hiding transactions and not much else. 
You couldn’t easily control who uses the system, you couldn’t verify anything about a user’s history or status without breaking their privacy, and you couldn’t build in compliance pathways or configurable access rules. The technology simply wasn’t there yet.
Today it is. 
Modern zero-knowledge technology has expanded what’s actually possible, and the design space is now dramatically larger than “hide all token transfers.” Payment privacy can now evolve into something far more intelligent and configurable than before. And entirely new categories of privacy applications are also emerging. Understanding this expanded design space requires a new mental model.
Three Dimensions of Privacy
A better way to understand privacy systems is to think in three dimensions, and most interesting applications involve choices along all three.
Privacy target: what exactly is being protected?
Transaction counterparties and amounts are the traditional focus, but the target could also be:
User attributes: wallet history, exchange activity, reputation signalsSensitive data: AI model weights, trading intent, preference profilesComputation processes: algorithm logic, inference steps, scoring mechanisms
For example, a system might shield your wallet address while still proving properties about your on-chain history (such as that you’ve held a token for six months without revealing which wallet is yours). Another might hide the logic of a matching algorithm while making its outputs publicly verifiable, so traders can trust the results without seeing how they were computed.
Unmasking protocol: how can protected information be revealed?
This is where things get interesting from a security and trust-level perspective, because different systems make very different choices about who can access what’s hidden and under what conditions. Some designs ensure only the user can ever reveal the protected information, while others allow a centralized operator or a committee to unmask under defined governance conditions. Some build in pathways for regulatory authorities to compel disclosure, or use hardware attestation that reveals under specific technical constraints.
This dimension determines trust boundaries and shapes compliance posture in ways that matter enormously for real-world adoption.
Target users: who can use the privacy mechanism?
Some systems offer permissionless access to everyone, while others restrict based on criteria like KYC status, on-chain history, attestations, or membership in verified sets. You might need to prove something about yourself to gain access, which sounds paradoxical but makes sense when you think about it. You can prove you belong to a group of verified users without revealing which specific member you are.
Together, these three dimensions define a design space far richer than “transactions are either visible or hidden.“
What This Unlocks
Once you start thinking about privacy in terms of these new dimensions, a much wider range of applications comes into view. While the first generation of privacy tools asked the single question of whether a transaction could be hidden, the expanded design space looks at what needs protecting, who should be able to reveal what information, and who should have access in the first place.
This shift in framing opens up use cases that would have seemed impossible under the old model. Here are a few examples we think represent where things are headed.
Private credential verification for social platforms. You might want to prove you’re a long-term holder or active DeFi user to boost your reputation on a platform, but linking your wallet publicly exposes your entire portfolio and history. With the right privacy design, you can verify credentials while keeping your wallet private.
Compliant private transactions gated by verified association. Traditional mixers have a reputation problem because anyone can enter, including bad actors. A better model uses ZK to gate access: users prove they belong to a trusted set before entering, for instance by demonstrating they’re long-term exchange users with strong trading history and clean behavioral profile.
Prediction markets on private algorithms. When a platform publishes sentiment or mindshare scores that determine market outcomes, how do traders know those calculations weren’t manipulated? ZK verification lets platforms prove every algorithm run was executed faithfully while keeping the methodology private.
Privacy-preserving data for AI training. AI is at the limits of public-domain data. ZK solves this by letting users compute summaries over their private data and publish only the results with a proof that verifies both the origin and correctness.
The common thread across all of these is that they combine choices along all three dimensions. What’s being protected varies. Who can unmask varies. Who gets access varies. But they’re all drawing from the same expanded design space that first-generation privacy tools couldn’t touch.
Toward a Generalized Privacy Framework
Look across those applications and a clear pattern emerges. They’re solving different problems for different users, but they’re drawing from the same underlying toolkit: attestations about user attributes, verifiable computation over private inputs, selective disclosure mechanisms. The primitives are shared even when the configurations differ.
This points toward shared infrastructure rather than bespoke systems: attestation registries where proofs get generated once and reused across applications, computational privacy frameworks for verifiable off-chain execution, and transactional privacy toolkits that make deploying compliant privacy pools more like configuration than research.
The three-dimensional framework maps directly onto what this infrastructure needs to provide. Targets, unmasking protocols, and access controls become the core primitives for a new infrastructure layer.
First Step: Intelligent Privacy Pool on BNB Chain
To demonstrate what this looks like in practice, Brevis and BNB Chain are collaborating with 0xbow to build an Intelligent Privacy Pool as the first concrete application.
The basic function builds on 0xbow’s Privacy Pools core functionalities: deposit assets, withdraw to a new address without an on-chain link between them. The pool is able to maintain an Association Set of deposits that meet compliance criteria. Only deposits in this set can be withdrawn privately. What makes it different is how this Association Set is defined and implemented.
Users prove eligibility of their deposits through one of two paths: on-chain provenance (proving funds originated from compliant sources via the Brevis ZK Data Coprocessor) or off-chain KYC binding (proving control of a verified exchange account, such as Binance, via zkTLS without revealing identity). Both paths use ZK proofs to verify eligibility without exposing sensitive data and relying on third-party trusts.
If a deposit is later flagged by sanctions or associated with malicious activity, it can be removed from the Association Set, blocking further withdrawals. This provides controlled unmasking for legitimate enforcement needs.
This is payment privacy, but implemented across all three dimensions: information privacy through proving attributes without revealing identity, transactional privacy through unlinkable deposits and withdrawals, and configurable access controls with removal pathways for edge cases. It shows what becomes possible when you apply the full design space to even the most familiar use case.
What Comes Next
The Intelligent Privacy Pool shows that the generalized framework works and that compliant privacy applications can be built using shared primitives.
The old framing of crypto privacy was limited by the technology available at the time. Now that limitation is gone. Privacy is a design space where what gets protected, how it can be revealed, and who gets access combine to enable entirely new categories of applications, and to make existing categories far more powerful.
Brevis, 0xbow, and BNB Chain are building toward that future together.
About Brevis
Brevis is a verifiable computing platform powered by zero-knowledge proofs, serving as the infinite compute layer for Web3. Applications can offload expensive computations off-chain while proving every result on-chain. The Brevis stack includes Pico zkVM for general-purpose computation, the ZK Data Coprocessor for trustless access to historical blockchain data, Pico Prism for real-time Ethereum block proving (99.6% coverage, 6.9s average), and ProverNet, a decentralized marketplace for ZK proof generation. To date, Brevis has generated hundreds of millions of proofs across 40+ protocols on 6 blockchains.
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number
Sitemap
Cookie Preferences
Platform T&Cs