Explore

Product navigation

Judges
60-second judge fast path with demo, proof, repo, and contact
Whiteprint
Founder roadmap for encrypted delivery, Mainnet review, and cross-chain expansion
Start
Guided onboarding and wallet-first flow
Learn
Workflow-first onboarding and product operating guide
Help
Product guide across routes, docs, and proof
Govern
Create, vote, and execute on Solana Testnet
Intelligence
Risk scoring, market context, and signer decision support
Treasury
Treasury health, solvency context, and agent policy routes
Payroll
Private payroll CSV, stablecoin choice, and auditor receipt flow
Gaming
Guilds, tournaments, inventory proposals, and reward operations
Compliance
Scoped compliance packs and bounded viewing-key evidence
Execute
Private payroll, vendor settlement, and treasury actions
Proof
Operation receipts, runtime logs, and verification routes
Developers
API docs, SDK starters, and integration surfaces
RPC Services
Hosted reads, relayer checks, QVAC status, and runtime endpoints
API Status
Backend health, visitor counters, and freshness endpoints
Command Center
Ops dashboard, indexed proposals, and readiness gates
Live State
Proposals, treasury, and action logs
Story
Live product story and fast explanation
Community
Join, updates, pilot interest, and support routing
Benefit
theMiracle wallet-placement benefit and Founding Governor access
Versus
PrivateDAO compared with Realms, Squads, Snapshot, and DAOhaus
Revenue
Self-hosted, managed SLA, and enterprise commercial tiers
Android
Mobile app, APK download, parity plan
Trust
Security, proof, and operating boundaries
Health
Runtime status and verification health
Custody
Multisig, authority transfer, and custody evidence
Analytics
Votes, proposals, actions
API & Pricing
Pilot, API, commercial packs
Engage
Buyer path, pilot motion, mainnet trajectory
Search
Search routes, docs, tracks, and proof
Docs
Curated reviewer and trust docs
Open-source core
Review access
Official use reserved
Legal Notice
Public review is open; official use requires coordination

PrivateDAO remains open source where the license applies and visible for judges and ecosystem reviewers while protecting founder authorship, brand identity, digital proof artifacts, and sensitive product packaging.

Phase 2 after judging
Encrypted customer delivery
Auditor-gated source
Mainnet review path
Post-judging roadmap

Phase 2 turns every service request into an encrypted delivery lane

After the active judging window, PrivateDAO will move the commercial service flow into a fully encrypted client lane: intake, package selection, provider routing, on-chain payment reference, time-limited access, delivery, renewal, and upgrade decisions will be bound to the customer's selected privacy and intelligence requirements.

The defensive license layer is designed to revoke access, erase locally sealed service material, and stop execution when tampering is detected. It is not designed to damage user devices or third-party systems.

After Phase 2, the roadmap moves into Mainnet deployment preparation and external security review. Phase 3 opens the same protected infrastructure cross-chain so sensitive institutions can use broader blockchain rails while Solana remains the guardian chain, first proof home, and decision layer that anchors the system.

Encrypted intake from the first form field through service delivery.
Time-bound license keys issued from on-chain payment and service terms.
Client-selected intelligence rails across QVAC local models, GoldRush, Dune SIM, Zerion, SNS, and Covalent-style recovery prompts.
Auditor-visible security review before sensitive source, policy matrices, and partner-only integration bundles are closed.
Mainnet deployment begins after the current judging phase and the required external security reviews.
Phase 3 expands the infrastructure cross-chain while Solana remains the guardian chain and first governance home.
Payment-bound access

The payment transaction hash can become the customer's activation reference after settlement confirmation.

Intelligence routing

QVAC handles local emergency and private briefs; external rails add wallet, market, identity, and simulation context.

Security review boundary

Sensitive source, policy matrices, and anti-tamper logic move behind auditor and partner review after the public judging phase.

Legal notice
IP and evidence boundary
Security review friendly

This notice is intended to protect the public-good review posture of PrivateDAO while keeping the path open for judges, auditors, Solana ecosystem contributors, partners, and serious institutional collaborators. It is not a substitute for formal legal counsel or a signed commercial agreement.

Public source review

The repository remains open source where the repository license applies, and the website remains available so judges, auditors, partners, and ecosystem reviewers can inspect the work. Review access does not grant permission to impersonate PrivateDAO, redeploy official surfaces, reuse brand identity, or commercialize official service packages without written coordination.

Code and license boundary

Source files that explicitly remain under AGPL-3.0-or-later keep the rights and duties of that license. PrivateDAO brand, product design, documents, evidence packets, roadmap material, media assets, service packaging, and official deployments are reserved unless separately licensed.

Digital evidence

On-chain transaction hashes, Supabase receipt traces, runtime proof packets, screenshots, and submission evidence are preserved as PrivateDAO review artifacts. They may be cited for evaluation, security reporting, and ecosystem coordination, but not copied into misleading or competing official claims.

Coordination path

PrivateDAO is open to ecosystem collaboration, audits, pilots, and official integration work. Open-source forks must respect the repository license; brand use, official-looking derivative deployments, commercial packaging, or government/institutional reuse should be coordinated through official PrivateDAO channels first.

Founder Whiteprint
Open the roadmap and download the reviewer whiteprint.
Trust surface
Open security, proof, and operating boundaries.
Repository
Review the source with the repository notice attached.