Current Solutions and Their Limits
Several projects have attempted to bring privacy to blockchains. Each makes meaningful contributions, but none provides a general-purpose data commitment system with ZK reveals on a sovereign L1. They are either limited to a single data type (tokens), dependent on trusted hardware, or architecturally constrained to a specific execution environment.
Comparison
| Solution | Scope | Proof System | Data Support | Composability | Limitation |
|---|---|---|---|---|---|
| Tornado Cash | Token mixing | Groth16 (Ethereum) | Tokens only (fixed denominations) | None (isolated pool) | Sanctioned by OFAC; pool-based custody; no general data support; frozen funds risk |
| Aztec | Private DeFi | PLONK (custom rollup) | DeFi primitives (transfers, swaps) | Within Aztec ecosystem | Rollup on Ethereum; not sovereign; limited to DeFi use cases; complex programming model |
| Zcash | Private payments | Groth16 (Sapling) / Halo 2 (Orchard) | Payment transactions only | None (UTXO model) | Payments only; no smart contracts; no general data; limited ecosystem |
| Secret Network | General private compute | TEE (Intel SGX) | Any (in trusted enclave) | Smart contract composability | Trust Intel hardware; side-channel attacks demonstrated; not cryptographically private |
| IPFS / Filecoin | Data availability | None | Any file | None (storage layer) | No privacy — content-addressed means anyone with the CID can read the data; no proofs |
Detailed Analysis
Tornado Cash
Tornado Cash demonstrated that Groth16 proofs and Merkle trees could provide meaningful transaction privacy on Ethereum. Its architecture — deposit tokens into a pool, withdraw from the pool with a ZK proof — is the direct ancestor of Specter's commit/reveal model.
However, Tornado Cash has critical limitations:
- Token-only: The system exclusively handles ETH and a small set of ERC-20 tokens in fixed denominations. There is no mechanism for committing arbitrary data.
- Pool custody: Deposited tokens sit in a smart contract. If the contract is sanctioned, paused, or exploited, funds are frozen. Users do not truly own their deposited assets — they own a proof that the pool owes them.
- Fixed denominations: Users must deposit and withdraw in preset amounts (0.1 ETH, 1 ETH, 10 ETH, 100 ETH). This limits usability and creates denomination-based linkability.
- Regulatory action: OFAC sanctions against Tornado Cash in August 2022 demonstrated that pool-based privacy is fragile. The contract still exists on Ethereum, but most front-ends are down and most compliant entities will not interact with addresses that have touched it.
- No composability: Tornado Cash is an isolated application. Its privacy does not extend to other contracts or protocols.
Aztec
Aztec is building a ZK-rollup on Ethereum with native privacy for DeFi operations. It uses PLONK proofs and a custom programming language (Noir) to enable private smart contracts.
Limitations:
- Rollup, not sovereign: Aztec inherits Ethereum's security but also its constraints. It cannot set its own consensus rules, validator set, or fee market. Upgrades require coordination with the Ethereum L1.
- DeFi-focused: The primary use cases are private token transfers and private DeFi interactions. General-purpose data commitments are not a core design goal.
- Programming complexity: Noir is a new language with a small ecosystem. Developers must learn Aztec-specific abstractions for private state, which increases adoption friction.
- Data availability on Ethereum: Rollup data is posted to Ethereum calldata, which is publicly visible. While individual transactions are encrypted, the metadata (transaction count, batch timing, gas usage) is exposed on the L1.
Zcash
Zcash pioneered production zero-knowledge proofs for blockchain privacy. Its shielded pool uses Groth16 (Sapling) and Halo 2 (Orchard) to enable fully private transactions where sender, receiver, and amount are hidden.
Limitations:
- Payments only: Zcash is a payment-focused cryptocurrency. It has no smart contract capability, no general-purpose execution environment, and no mechanism for committing arbitrary data.
- UTXO model: The UTXO-based architecture makes it difficult to build complex applications on top of Zcash. There is no account state, no contract storage, and no programmable logic beyond the payment circuits.
- Low shielded adoption: Despite being available since 2016, the vast majority of Zcash transactions are transparent (non-shielded). The optional nature of privacy reduces the anonymity set for users who do use shielded transactions.
- No composability: Shielded transactions cannot interact with external protocols, oracles, or cross-chain bridges without exiting the shielded pool.
Secret Network
Secret Network uses Trusted Execution Environments (TEEs) — specifically Intel SGX enclaves — to provide private smart contract execution. Contract state is encrypted at rest and decrypted only inside the enclave.
Limitations:
- Hardware trust assumption: Security depends on Intel's SGX implementation being free of vulnerabilities. This is a strong assumption. Multiple side-channel attacks against SGX have been demonstrated in academic literature (Foreshadow, Plundervolt, SGAxe).
- Not cryptographically private: TEE-based privacy is fundamentally different from ZK-based privacy. A TEE provides computational isolation, not mathematical proof. If the enclave is compromised, all data is exposed retroactively.
- Single point of failure: All validators run the same Intel hardware. A vulnerability in SGX compromises the entire network simultaneously.
- Attestation complexity: Verifying that a validator is running genuine SGX hardware requires Intel's attestation service, introducing a centralized dependency.
IPFS and Filecoin
IPFS provides content-addressed, decentralized file storage. Filecoin adds economic incentives for storage providers. Together, they solve the data availability problem but not the data privacy problem.
Limitations:
- No privacy: IPFS is content-addressed. Anyone who knows the Content Identifier (CID) of a file can retrieve and read it. There is no access control, no encryption at the protocol level, and no proof system.
- No proofs: There is no mechanism to prove knowledge of data stored on IPFS without revealing the data or the CID. You cannot demonstrate that a file meets certain criteria without making the file public.
- Encryption is DIY: Users can encrypt data before uploading to IPFS, but key management, access control, and proof generation are entirely the user's responsibility. There is no protocol-level integration.
- Availability, not verifiability: IPFS guarantees that data is available and has not been tampered with (via content addressing). It does not guarantee anything about the meaning or properties of the data without revealing it.
What Is Missing
The landscape reveals a consistent gap. No existing solution provides all of the following:
- Data-agnostic commitments — the ability to commit any data type (credentials, images, API keys, tokens, encryption keys) to an on-chain structure.
- ZK-based reveals — the ability to prove knowledge of committed data without revealing it, using cryptographic proofs rather than trusted hardware.
- Unlinkability — the inability for any observer to connect a commitment to its corresponding reveal.
- Sovereign L1 — a chain that controls its own consensus, governance, and upgrade path, not dependent on another chain's constraints.
- EVM composability — the ability for existing Solidity contracts and tooling to interact with the privacy system natively.
- Programmable policies — the ability to bind enforceable rules (timelocks, restrictions, thresholds) to commitments, verified inside the ZK circuit.
Specter is designed to fill this gap. The Ghost Protocol provides a general-purpose commit/reveal system over Poseidon-hashed Merkle trees with Groth16 ZK proofs, running on a sovereign Cosmos SDK chain with full EVM compatibility. The sections that follow describe how this works.