ZK-SNARK Privacy Protocol

OPAQ

Choose what you reveal.

ZK-SNARK based programmable privacy protocol. Control your on-chain transparency.

Check Your Privacy Score
Scroll
The Problem

The Exposure
Problem

Solana transactions are fully transparent by default. Your financial activity is an open book -- readable, trackable, and exploitable by anyone.

01

Whale Tracking

Every large position is visible on-chain. Adversaries front-run your moves before they settle.

02

Strategy Exposure

DeFi strategies, yield farms, liquidation thresholds -- all readable by anyone with a block explorer.

03

MEV Exploitation

Searchers extract value from your transactions through sandwich attacks and priority gas auctions.

04

Business Privacy

Treasury operations, payroll, vendor payments -- all broadcast to competitors and the public.

“Every transaction is a window into your strategy. On a transparent chain, privacy isn't optional -- it's survival.”

The Solution

Programmable
Privacy

01

Private Transfer

Hide sender, receiver, and amount in a single transaction. ZK proofs guarantee validity without revealing details.

opaq.transfer({
  to: "hidden",
  amount: "encrypted",
  proof: groth16.prove(circuit)
});
02

Programmable Disclosure

Set rules that automatically reveal transaction data to specified parties -- auditors, regulators, or counterparties -- without exposing it to the public.

disclosure.addRule({
  if: "tx.amount > 10_000",
  reveal: ["amount", "sender"],
  to: ["auditor.sol"]
});
03

Privacy Pools

Batch-anonymize tokens through shared liquidity pools. Break the on-chain link between deposit and withdrawal addresses.

pool.deposit(amount, {
  commitment: hash(secret, nullifier),
  merkleRoot: pool.root()
});
04

Selective Disclosure

Generate ZK certificates proving properties about your activity -- creditworthiness, compliance, identity -- without revealing underlying data.

const cert = zk.certify({
  claim: "balance > 1000 SOL",
  reveal: false,
  validity: "30d"
});
05

Protocol SDK

Integrate privacy into any Solana program. Lending protocols, DEXes, and DAOs can offer confidential transactions out of the box.

import { OpaqSDK } from "@opaq/sdk";

const opaq = new OpaqSDK({
  network: "mainnet-beta",
  proofLevel: "groth16"
});
∀x ∈ F_p : ∃w s.t. C(x,w) = 0 · e(A,B) = e(α,β) · e(L,γ) · e(H,δ) · Σ a_i · u_i(x) = h(x) · t(x) ·
∀x ∈ F_p : ∃w s.t. C(x,w) = 0 · e(A,B) = e(α,β) · e(L,γ) · e(H,δ) · Σ a_i · u_i(x) = h(x) · t(x) ·
∀x ∈ F_p : ∃w s.t. C(x,w) = 0 · e(A,B) = e(α,β) · e(L,γ) · e(H,δ) · Σ a_i · u_i(x) = h(x) · t(x) ·
∀x ∈ F_p : ∃w s.t. C(x,w) = 0 · e(A,B) = e(α,β) · e(L,γ) · e(H,δ) · Σ a_i · u_i(x) = h(x) · t(x) ·
∀x ∈ F_p : ∃w s.t. C(x,w) = 0 · e(A,B) = e(α,β) · e(L,γ) · e(H,δ) · Σ a_i · u_i(x) = h(x) · t(x) ·
∀x ∈ F_p : ∃w s.t. C(x,w) = 0 · e(A,B) = e(α,β) · e(L,γ) · e(H,δ) · Σ a_i · u_i(x) = h(x) · t(x) ·
∀x ∈ F_p : ∃w s.t. C(x,w) = 0 · e(A,B) = e(α,β) · e(L,γ) · e(H,δ) · Σ a_i · u_i(x) = h(x) · t(x) ·
∀x ∈ F_p : ∃w s.t. C(x,w) = 0 · e(A,B) = e(α,β) · e(L,γ) · e(H,δ) · Σ a_i · u_i(x) = h(x) · t(x) ·
Under the Hood

The Zero-Knowledge
Engine

x, wInputPrivate data
C(x,w)=0CircuitR1CS constraints
πProofGroth16 / PLONK
VerifiedOn-chain

Groth16 Proofs

Constant-size proofs (~200 bytes) with millisecond verification times. Trusted setup via multi-party ceremony ensures no single entity can forge proofs.

proof_size: 3 G1 + 1 G2 elements = ~192 bytes

PLONK Universal Setup

One ceremony, unlimited circuits. PLONK enables new privacy programs without additional trusted setups.

universal_srs: O(n) updateable

Poseidon Hash

ZK-friendly hash function optimized for arithmetic circuits. 8x fewer constraints than SHA-256 inside a SNARK.

Solana Integration

On-chain verifier programs written in native BPF for minimal compute unit consumption. Proof verification in a single transaction, no multi-step flows.

verify_cost: ~200,000 CU $0.00004 per proof
Token Utility

$OPAQ

The native token powering privacy infrastructure on Solana. Four interlocking utility mechanisms create sustained demand.

Stake

Privacy Pool Staking

Participate as a pool operator or liquidity provider by staking $OPAQ. Higher stake increases pool capacity and earns a share of proof fees.

Min stake: dynamic, set by governance
Burn

Proof Fee Buyback & Burn

50% of all proof generation fees are used to buy $OPAQ on the open market and permanently burn it. Deflationary by design.

50% buyback, 50% to stakers
License

SDK Licensing

Protocols integrating the OPAQ SDK pay licensing fees in $OPAQ. DeFi protocols, wallets, and DAOs become long-term demand drivers.

Annual license tied to usage volume
Vote

Governance

Token holders vote on disclosure rules, pool parameters, fee structures, and protocol upgrades. One token, one voice in shaping privacy standards.

Quadratic voting on key proposals
Get Started

Reclaim Your
Financial Privacy

The transparent era of on-chain finance is ending. Choose what you reveal -- and prove the rest with mathematics, not trust.