Explore

Product navigation

Judge Route
Canonical reviewer path with product proof, integrations, awards context, and runtime evidence
Start
Guided onboarding and wallet-first flow
Learn
Workflow-first onboarding and product operating guide
Help
Product guide across routes, docs, and proof
Govern
Create, vote, and execute on Solana Testnet
Intelligence
Risk scoring, market context, and signer decision support
Treasury
Treasury health, solvency context, and agent policy routes
Payroll
Private payroll CSV, stablecoin choice, and auditor receipt flow
Gaming
Guilds, tournaments, inventory proposals, and reward operations
Compliance
Scoped compliance packs and bounded viewing-key evidence
Execute
Private payroll, vendor settlement, and treasury actions
Proof
Operation receipts, runtime logs, and verification routes
Developers
API docs, SDK starters, and integration surfaces
RPC Services
Hosted reads, relayer checks, QVAC status, and runtime endpoints
API Status
Backend health, visitor counters, and freshness endpoints
Command Center
Ops dashboard, indexed proposals, and readiness gates
Live State
Proposals, treasury, and action logs
Story
Live product story and fast explanation
Community
Join, updates, pilot interest, and support routing
Benefit
theMiracle wallet-placement benefit and Founding Governor access
Versus
PrivateDAO compared with Realms, Squads, Snapshot, and DAOhaus
Revenue
Self-hosted, managed SLA, and enterprise commercial tiers
Android
Mobile app, APK download, parity plan
Trust
Security, proof, and operating boundaries
Health
Runtime status and verification health
Custody
Multisig, authority transfer, and custody evidence
Analytics
Votes, proposals, actions
API & Pricing
Pilot, API, commercial packs
Engage
Buyer path, pilot motion, mainnet trajectory
Search
Search routes, docs, tracks, and proof
Docs
Curated reviewer and trust docs
Payroll-grade privacy
Umbra + Cloak + MagicBlock
Encrypt / IKA + REFHE
Confidential payments
Sovereign encrypted payment coordination for organizations on Solana

This route packages the full confidential payment stack as an operational product surface: encrypted planning, private payout rails, intelligence-assisted risk review, and proof-linked execution continuity.

Route summary

Use PrivateDAO like infrastructure, not like a static brochure

This services route explains hosted reads, privacy policies, payout corridors, and the integration starter needed to plug the product into real organizations.

Execution boundaries

This section combines multiple rails. Some cards execute live flows, others expose health or receipt continuity. The boundaries stay explicit so visitors know what has already moved on-chain and what is still a review or readiness step.

Live execution
A route actually prepares or submits a real runtime action on its current rail.
Health / status
A route checks vendor availability, relayer readiness, or runtime state without moving funds.
Intent receipt
A route records a review-safe intent or receipt so operators and judges can inspect continuity.
Full private settlement
A route reaches the actual payout rail and finishes the confidential transfer lifecycle.
Confidential payments system

Encrypted payment coordination built as product infrastructure

This lane is not a trading flow. It is operational infrastructure for confidential payroll, encrypted treasury coordination, secure payout routing, and AI-assisted pre-sign controls, with each rail connected to review and proof surfaces on Solana Testnet.

IKA key control guardrails

UserShareEncryptionKeys activation rules

`UserShareEncryptionKeys` must be created before dWallet creation, and the selected curve must match the dWallet signature path. Any mismatch breaks authorization and decryption flows.

ECDSASecp256k1 / Taproot
Curve.SECP256K1
ECDSASecp256r1
Curve.SECP256R1
EdDSA
Curve.ED25519
SchnorrkelSubstrate
Curve.RISTRETTO
  1. 1. Generate root seed securely, then derive `UserShareEncryptionKeys` with matching curve.
  2. 2. Register encryption key and keep serialized key bytes in secure storage only.
  3. 3. For dWallet activation: sign user public output and verify state before submit.
  4. 4. For decrypt flow: verify active dWallet state, validate share signature, then decrypt and verify output consistency.
MagicBlock Private Payments

Private Payments API is wired with the correct auth boundary

PrivateDAO now exposes MagicBlock health and challenge initiation through the read-node while preserving the required wallet-signed login step. Private balance reads are not fetched anonymously because MagicBlock requires the challenge/login bearer token for private state.

Execution shape
1public balance read
2challenge
3wallet signs message
4login bearer token
5private balance read
6unsigned deposit/transfer/withdraw transaction
7wallet signs and submits
Cloak SDK contract

UTXO-first devnet lane, verified without exposing secrets

This route now distinguishes the hosted PrivateDAO intent receipt from the official Cloak devnet SDK surface. Reviewers can see the exact SDK package, program, relay, and probe command used for live validation.

SDK
@cloak.dev/sdk-devnet
0.1.5-devnet.1 installed in the web app.
Devnet relay
https://api.devnet.cloak.ag
Checked by the generated live probe packet.
Secret handling

The live probe records only public program IDs, public relay status, and public transaction or receipt references. It does not print private keys, viewing keys, UTXO private keys, raw notes, or seed material.

Capability matrix
UTXO API
Primary
transact, createUtxo, createZeroUtxo, transfer, withdraw, and swap helpers are the active integration contract.
Viewing keys
Ready
The SDK path derives nk for scan/decrypt readiness, and the product boundary forbids logging private key material.
Relay / Merkle
Live checked
The repo probe checks Cloak devnet relay health and the executable devnet program account.
Compliance history
Available
Scanner and CSV exports are present in the SDK surface; full history requires a funded wallet and persisted UTXOs.
Read-node receipt
Live
The hosted PrivateDAO API returns a Cloak-labelled testnet intent receipt for reviewer-visible continuity.
Umbra SDK runtime

Devnet relayer, SDK contract, and claim lifecycle are exposed for review

The live lane checks the Umbra devnet relayer through the PrivateDAO read-node and keeps the exact claim boundary visible: browser clients still need wallet signing, SDK-generated proof account data, UTXO slot data, and relayer polling before a real claim is submitted.

Verified public fields
Relayer
https://relayer.api-devnet.umbraprivacy.com
Supported mints
So11111111111111111111111111111111111111112
DXQwBNGgyQ2BzGWxEriJPVmXYFQBsQbXvfvfSNTaJkL6
4oG4sjmopf5MzvTHLE8rpVJ2uyczxfsw2K84SUTpNDx7
Claim lifecycle
receivedvalidatingoffsets_reservedbuilding_txtx_builtsubmittingsubmittedawaiting_callbackcallback_receivedfinalizingcompleted
Operational flow
  1. 1. Prepare confidential policy and payroll intent through local-first intelligence.
  2. 2. Encrypt sensitive payloads client-side with Encrypt / IKA envelope before execution lanes.
  3. 3. Route settlement through Cloak/Umbra/MagicBlock rails based on confidentiality and speed requirements.
  4. 4. Publish commitment-safe receipts to proof and judge surfaces for verifiable operational continuity.
Chain verification stays simple here: first inspect the rail status, then generate the encrypted intent or receipt, then open Proof for the explorer link, transaction anchor, or relayer reference that belongs to that exact flow.
IKA protocol economics context

For payment-lane planning, IKA economics matters at runtime: operation pricing, validator incentives, and governance adjustments can affect dWallet lifecycle costs (generation, presign, signing, resharing). This route keeps those economics visible to treasury operators before finalizing confidential execution policies.