Wasder

Programmable Access Control for Compliant Onchain Workflows

Keep customer data, counterparties, and business logic confidential—while enabling selective disclosure and audit-ready verification.

Not anonymity-by-default. Policy-ready confidentiality.

The Data Access Control Gap

Onchain execution is composable—but regulated workflows still lack a standard way to enforce who can reveal what, under which conditions, with accountable key governance.

Opaque Pipelines

Hard to audit data flows and detect silent policy drift in purely off-chain systems.

Agentic Security Risks

Autonomous execution amplifies leakage and operator risk without cryptographic constraints.

Missing Infrastructure

No standard layer for policy + key governance + verification in current L1/L2 stacks.

Solution

Secrets-as-a-Service, Enforced Onchain

A cryptographic access-control layer combining three critical primitives:

Encrypted Computation

Compute without revealing inputs

Verifiable Claims

Prove correctness without revealing data

Governed Decryption

Who can decrypt, what, when—under policy

Reference Architecture

Policy Layer
Smart Contracts
Key Governance
Distributed / Threshold
Encrypted Compute
CKKS-based FHE runtime
Proof Layer
ZK Verification
App Integration
EVM / Systems

"Secrets are kept encrypted by default, enabling selective disclosure and auditability only when policy conditions are met."

Core Capabilities

Policy-as-Code

Define who can compute, decrypt, or attest under explicit onchain conditions.

Client-side Encryption

Secrets enter the system encrypted by design, never exposed to intermediaries.

Confidential Compute

Evaluate sensitive business logic and rules without exposing the inputs.

Selective Disclosure

Share cryptographic proofs and results without sharing the raw underlying data.

Dual-Mode Workflows

Support public and confidential paths with shared validity checks.

Enterprise Interop

Integrate blockchain logic with existing databases and legacy systems.

Built for Compliant Onchain Finance & Operations

Bridging the gap between improved efficiency and regulatory requirement.

AML-Compliant Private Payments

Confidentiality with compliance constraints and verifiable validity.

Private Treasury & BTC-Linked Positioning

Keep exposure and strategy confidential while executing onchain.

Confidential Block Deals & Settlement

Minimize counterparty and metadata leakage.

Collaborative AML Signals

Share signals and verifiable outcomes—not raw customer data.

Proof-of-Reserves

Private assets with real-time verifiable reserve checks.

Private Payroll & Vendor Payments

Protect salaries, identities, and contract terms.

Deployment Models

Choose the model that matches your key governance and compliance requirements.

Available
Hosted (SaaS)
Fully managed infrastructure

Ideal for pilots and collaborative workflows where neutral key hosting is preferred.

Beta
Deployable SDK
On-prem / Cloud-native

Run the stack in your VPC for maximum control over data sovereignty.

Planned
Container Module
Edge / Federated

Lightweight containers for edge devices or federated learning setups.

Threat Model, Made Explicit

Confidentiality

Designed so compute operators do not access plaintext during processing.

Integrity

Proofs/verification enable audit-ready outputs without revealing secrets.

Key Governance

Support models where no single party unilaterally decrypts.

Integrate in Days, Not Months

Abstractions that handle the cryptography, so you can focus on the business logic.

1

Install SDK

Client encryption + policy binding libraries.

2

Submit Job

Encrypted payload submission via standard APIs.

3

Verify Onchain

Consume outputs/claims in Solidity for enforcement.

# Example: Encrypted Value Submission

const encryptedInput = await fhe.encrypt(

value, contractAddress, userKey

);

// Submit transaction with encrypted arguments

await contract.submitProtectedData(

encryptedInput.handle,

encryptedInput.proof

);

Frequently Asked Questions

Ready to run a pilot?

Share your workflow and constraints. We’ll propose a threat model, policy surface, and integration plan.