Explore

Product navigation

Judge Route
Canonical reviewer path with product proof, integrations, awards context, and runtime evidence
Whiteprint
Founder roadmap for encrypted delivery, Mainnet review, and cross-chain expansion
Start
Guided onboarding and wallet-first flow
Learn
Workflow-first onboarding and product operating guide
Help
Product guide across routes, docs, and proof
Govern
Create, vote, and execute on Solana Testnet
Intelligence
Risk scoring, market context, and signer decision support
Treasury
Treasury health, solvency context, and agent policy routes
Payroll
Private payroll CSV, stablecoin choice, and auditor receipt flow
Gaming
Guilds, tournaments, inventory proposals, and reward operations
Compliance
Scoped compliance packs and bounded viewing-key evidence
Execute
Private payroll, vendor settlement, and treasury actions
Proof
Operation receipts, runtime logs, and verification routes
Developers
API docs, SDK starters, and integration surfaces
RPC Services
Hosted reads, relayer checks, QVAC status, and runtime endpoints
API Status
Backend health, visitor counters, and freshness endpoints
Command Center
Ops dashboard, indexed proposals, and readiness gates
Live State
Proposals, treasury, and action logs
Story
Live product story and fast explanation
Community
Join, updates, pilot interest, and support routing
Benefit
theMiracle wallet-placement benefit and Founding Governor access
Versus
PrivateDAO compared with Realms, Squads, Snapshot, and DAOhaus
Revenue
Self-hosted, managed SLA, and enterprise commercial tiers
Android
Mobile app, APK download, parity plan
Trust
Security, proof, and operating boundaries
Health
Runtime status and verification health
Custody
Multisig, authority transfer, and custody evidence
Analytics
Votes, proposals, actions
API & Pricing
Pilot, API, commercial packs
Engage
Buyer path, pilot motion, mainnet trajectory
Search
Search routes, docs, tracks, and proof
Docs
Curated reviewer and trust docs
Encrypt / IKA
Client-side encryption
Proof-linked
Encrypted operations
Turn confidential operations into a real user workflow instead of abstract cryptography claims

This lane packages Encrypt/IKA fit in an operational way: plan encrypted operations, produce client-side encrypted payloads, keep commitment hashes, and carry continuity into proof.

Phase 2 after judging
Encrypted customer delivery
Auditor-gated source
Mainnet review path
Post-judging roadmap

Phase 2 turns every service request into an encrypted delivery lane

After the active judging window, PrivateDAO will move the commercial service flow into a fully encrypted client lane: intake, package selection, provider routing, on-chain payment reference, time-limited access, delivery, renewal, and upgrade decisions will be bound to the customer's selected privacy and intelligence requirements.

The defensive license layer is designed to revoke access, erase locally sealed service material, and stop execution when tampering is detected. It is not designed to damage user devices or third-party systems.

After Phase 2, the roadmap moves into Mainnet deployment preparation and external security review. Phase 3 opens the same protected infrastructure cross-chain so sensitive institutions can use broader blockchain rails while Solana remains the guardian chain, first proof home, and decision layer that anchors the system.

Encrypted intake from the first form field through service delivery.
Time-bound license keys issued from on-chain payment and service terms.
Client-selected intelligence rails across QVAC local models, GoldRush, Dune SIM, Zerion, SNS, and Covalent-style recovery prompts.
Auditor-visible security review before sensitive source, policy matrices, and partner-only integration bundles are closed.
Mainnet deployment begins after the current judging phase and the required external security reviews.
Phase 3 expands the infrastructure cross-chain while Solana remains the guardian chain and first governance home.
Payment-bound access

The payment transaction hash can become the customer's activation reference after settlement confirmation.

Intelligence routing

QVAC handles local emergency and private briefs; external rails add wallet, market, identity, and simulation context.

Security review boundary

Sensitive source, policy matrices, and anti-tamper logic move behind auditor and partner review after the public judging phase.

Route summary

Use PrivateDAO like infrastructure, not like a static brochure

This services route explains hosted reads, privacy policies, payout corridors, and the integration starter needed to plug the product into real organizations.

Services route brief

Services should show the business model, the operating lane, and the live Testnet proof in one commercial surface

This route works best when pricing, billing rehearsal, treasury routing, trust packets, and hosted-read packaging are kept together instead of being split across static documents.

Lead with the product lane a buyer can try immediately from a Testnet wallet.
Keep pricing and billing language tied to the current public-good Testnet boundary, not to unshipped mainnet claims.
Use the commercial surface to show that PrivateDAO can evolve into a sustainable infrastructure company.
The product value here is simple: operations become encrypted before execution, and only commitment-safe artifacts move into shared review lanes. This keeps privacy load-bearing while preserving audit continuity.
Private encryption workbench

Client-side encrypted payroll/vendor payload

This step runs encryption in-browser before execution. Only encrypted payload + commitment moves forward to receipts and audit flow.

Prepare a payroll/vendor payload, encrypt locally, and keep only encrypted output.
Encrypted operations lane

Plan a sponsor-grade confidential operation inside the product

This workbench turns the confidential payout story into an actual operating plan. It helps the same product read better for Privacy, Umbra, and Encrypt by making the encrypted operation, settlement posture, and reviewer path explicit.
Confidential operation plan
This plan can be carried into reviewer packets, treasury review, and sponsor-facing submission work without rewriting the product story.
Reviewer-safe confidential operation
Recommended amount
1,000 USDC
Recipient count hint
8
Prepare a governed salary or grant disbursement where the manifest stays off-chain and the settlement path remains reviewable. Use the existing private governance discipline and keep recipient detail in an encrypted off-chain manifest. Use the current settlement evidence posture with explicit reviewer-safe continuity.
Raises PrivacyRaises UmbraRaises Encrypt
{
  "requestId": "ENCRYPTED:CONFIDENTIAL-PAYROLL:MANIFEST-HASH-AND-COMMIT-REVEAL:ATTESTED-EVIDENCE",
  "operationProfile": "Confidential payroll",
  "privacyMode": "Manifest hash + commit-reveal",
  "settlementMode": "Attested evidence",
  "operatorVisibility": "Hybrid",
  "sponsorLift": [
    "Privacy",
    "Umbra",
    "Encrypt"
  ],
  "recommendedAmount": "1,000 USDC",
  "recipientCountHint": "8",
  "posture": "Reviewer-safe confidential operation",
  "rationale": "Prepare a governed salary or grant disbursement where the manifest stays off-chain and the settlement path remains reviewable. Use the existing private governance discipline and keep recipient detail in an encrypted off-chain manifest. Use the current settlement evidence posture with explicit reviewer-safe continuity.",
  "reviewerPath": "/security",
  "servicePath": "/services",
  "settlementPath": "/documents/settlement-receipt-closure",
  "proofPath": "/documents/confidential-payout-evidence-packet",
  "nextOperatorAction": "Keep the manifest boundary explicit and carry the same operation plan into treasury review and governed execution."
}
Review checklist
  • Confirm the operation profile is confidential payroll and the recipient count posture still matches the intended treasury motion.
  • Confirm Manifest hash + commit-reveal is the right privacy mode for the sponsor and reviewer expectations.
  • Confirm Attested evidence keeps the trust boundary readable enough for this submission and release stage.
  • Confirm Hybrid keeps the operation understandable to the target reviewer without weakening the privacy story.
Continue the same lane
Use the security route for the privacy story, the services route for the treasury motion, and the settlement packet for reviewer continuity.