githubEdit

Privacy

Privacy is a critical concern for blockchain clients. At the same time, privacy and trustlessness are often in direct tension. Techniques that aim to hide queries, access patterns, or user intent significantly complicate proof generation and verification. In many cases, strong privacy mechanisms undermine trustlessness by reintroducing trusted intermediaries or by requiring cryptographic constructions that are currently impractical at scale.

Proof-based verification requires explicit disclosure of the data being verified and its dependencies. Fully privatizing read access or execution paths while preserving verifiable correctness remains an open and costly problem.

Privacy Dimensions

Privacy concerns in blockchain client architectures can be separated into distinct dimensions, each with different threat models and mitigation strategies.

Client–Server Privacy

The service a client connects to can observe connection metadata such as IP addresses, timing information, and access patterns. This information may allow identification of users or correlation of otherwise unrelated activities. For example, repeated access from the same network location to different wallet addresses can reveal implicit relationships between those addresses.

Read Privacy

An RPC provider can observe all read requests issued by a client. From these requests, it may be possible to infer user intent. In decentralized finance workflows, preparatory reads often reveal which transactions a user is planning to submit next, enabling adversarial behavior such as frontrunning or targeted manipulation.

Write Privacy

Transaction submission leaks information as well. An RPC provider can associate outgoing transactions with a specific client or network identity before they are finalized on-chain, allowing off-chain linkage of on-chain activity.

Risk Assessment

  • Client–Server Privacy: Users may be monitored, profiled, or linked to specific blockchain data based on network metadata.

  • Read Privacy: Observed read patterns can leak strategy, intent, or future transactions.

  • Write Privacy: Transactions can be correlated with users prior to on-chain finality.

Existing Privacy Approaches

  • Network-Level Privacy: Onion routing networks such as Tor or mixnets such as HOPR decouple network identity from access patterns.

  • Private Information Retrieval (PIR): PIR techniques allow clients to retrieve data without revealing which item was accessed. This comes at the cost of substantial server-side computation, increased bandwidth usage, and higher latency.

  • Private Transactions: Specialized protocols enable confidential transaction submission and execution, typically by modifying transaction formats or execution semantics.

Colibri Approach

Within Colibri, privacy is not treated as a purely theoretical objective. Instead, it is evaluated from the perspective of practical deployability and operational viability. The goal is to derive privacy mechanisms that can be applied in real-world systems, across heterogeneous devices and environments, rather than relying on constructions that are theoretically sound but impractical in production.

This pragmatic perspective allows Colibri to identify concrete and meaningful privacy use cases, while avoiding approaches that introduce excessive complexity, unrealistic resource requirements, or hidden trust assumptions.

Client–Server Privacy

Network-level privacy mechanisms operate at the transport layer. Onion routing or mixnets can be used transparently on top of Colibri without affecting proof generation or verification.

Read Privacy

PIR-based approaches generally require servers to process large data sets cryptographically in order to obscure which item is accessed. When combined with proof-based verification, this implies constructing and verifying proofs over large data groups, leading to prohibitive computational and latency overhead.

A pragmatic approach supported by Colibri is to query provable groups of data instead of individual values. By requesting and verifying a larger, structured data set, the specific item of interest is obscured from the data provider. The final selection and interpretation are performed locally by the client. This preserves verifiability while providing partial read privacy.

Write Privacy

Colibri does not currently address transaction-level privacy. Such mechanisms operate at the protocol or application layer and are orthogonal to stateless verification.

Privacy as a Layered Model

Privacy is inherently costly. Stronger privacy guarantees require increased bandwidth, higher latency, additional computation, or explicit economic cost. Not all applications have the same privacy requirements.

Colibri therefore follows a layered privacy model. Trustless verification forms the base layer. Privacy-enhancing techniques can be applied selectively on top, depending on the application’s threat model and requirements. Trustlessness is not traded for privacy; privacy is treated as an optional and explicit extension.

Additional Privacy Techniques

Several privacy techniques are frequently discussed in the context of blockchain clients. These approaches are relevant to the broader ecosystem but must be evaluated carefully with respect to trustlessness, deployability, and resource constraints.

Trusted Execution Environments (TEE)

Trusted Execution Environments can be used as an optional add-on to protect query processing and data handling on the server side. However, they introduce strong trust assumptions in hardware vendors and specific CPU architectures and are vulnerable to side-channel attacks. Colibri is designed as a general, trustless client architecture that must operate across a wide range of devices and environments. Privacy mechanisms must therefore not depend on specialized hardware or platform-specific guarantees.

Oblivious RAM (ORAM)

ORAM techniques aim to hide access patterns by continuously reshuffling data and issuing dummy accesses. While theoretically attractive, ORAM is extremely costly when applied to dynamic state machines such as Ethereum. The continuously changing global state, frequent updates, and large data volume make ORAM-based approaches impractical. In addition, ORAM requires the client to maintain and update complex position mappings, resulting in prohibitive memory, bandwidth, and computation requirements for realistic blockchain deployments.

Private Mempools and Transaction Relays

Private transaction relays and mempool-level privacy mechanisms address transaction submission and ordering. They are relevant for write privacy but do not address read privacy or state verification. These approaches are orthogonal to Colibri’s stateless verification model and are therefore not considered part of the client architecture.

Last updated