System Overview
Nullmask's architecture consists of several interacting components that together enable privacy-preserving transactions on EVM chains.
Architecture Diagram
Data Flow
User signs a standard EIP-1559 transaction in their wallet
Proxy intercepts the RPC call and parses the user's intent
Shielding service selects funding notes and prepares circuit inputs
Noir circuits generate a ZK proof via the Barretenberg prover
Relayer submits the proof and public inputs to the smart contract
Contract verifies the proof, spends nullifiers, and adds new note commitments to the Merkle tree
Notes scanner monitors chain events and decrypts new notes for the user
Last updated