Executive Summary

Sunima is the first blockchain where privacy and regulatory compliance coexist by design.

Existing privacy blockchains (Zcash, Monero, Tornado Cash, Aztec, Aleo) offer anonymity at the cost of regulatory rejection. Existing compliance solutions (CEX custody, traditional banking) offer legal clarity at the cost of user privacy. Every project to date has treated these as opposing forces.

Sunima resolves the contradiction through five coordinated innovations:

  1. Defense-in-Depth Architecture โ€” A focused suite of four privacy-first DeFi products (DEX, Staking, Lending, Bridge), each engineered with multiple independent validation, authorization, and settlement layers. The full internal topology is documented for verified node runners and auditors.
  2. TFHE by Default โ€” Every balance, transfer, and internal state variable is encrypted using Torus Fully Homomorphic Encryption. Users interact with encrypted data without ever exposing plaintext to any party, including the protocol itself.
  3. Quantum-Proof Distributed Custody โ€” The master threshold key is split across 100 Shamir shares, distributed across five independent layers (node runners, smart contracts, user wallets, founder infrastructure, and physical paper backups). No single compromise vector can reconstruct the key.
  4. Programmable Compliance via AI Sentinel โ€” A three-tier monitoring system filters 99% of transactions through static rules, 0.9% through lightweight machine learning, and 0.1% through full HYDRA consensus audit. Gray-market transactions are respected; black-market transactions (OFAC sanctions, terror financing, ransomware) are flagged and subject to court-ordered selective disclosure.
  5. Code Over Identity โ€” Sunima Labs operates without a public team roster, without VC backing, and without paid advisors. The protocol is the team. The whitepaper is the resume. The audited contracts are the credentials. Trust comes from open code and verifiable cryptography, not from biographies.
The result is a blockchain that offers the privacy of Swiss banking, the compliance of a regulated exchange, the decentralization of Bitcoin, and an uncompromising commitment to code-first, identity-last operations.

1. The Problem: Privacy and Compliance as False Dichotomy

1.1 Existing Privacy Solutions Fail Institutions

Privacy in cryptocurrency today exists on a spectrum, but every point on that spectrum fails one critical constituency:

Institutional investors managing billions of dollars have a simple requirement: they want the ability to transact privately while maintaining the ability to prove, when legally required, that their funds are not connected to sanctioned entities or criminal activity. No existing blockchain provides this.

1.2 Existing Compliance Solutions Fail Users

Traditional financial institutions offer compliance, but at a cost:

The Sunima thesis is that compliance should be programmable, selective, and consensus-based โ€” not centrally enforced by any single party.

1.3 The Gray Market Reality

Approximately 80% of global wealth sits in the "gray market": legal but unregistered, offshore but compliant, private but not criminal. Freelancers paid in crypto, families supporting relatives across borders, businesses shielding trade secrets, individuals in authoritarian regimes protecting their savings.

Sunima treats gray-market users as the primary customer base. We do not surveil them. We do not flag them. We provide the same privacy guarantees to a Brazilian freelancer as to a Swiss family office.

Sunima treats black-market users (sanctioned entities, terror financiers, ransomware operators) as an adversary. We flag them algorithmically and cooperate with legitimate legal processes under strict multi-party consensus.


2. The Sunima Vision

2.1 Philosophical Foundation

Sunima is built on three convictions:

Conviction 1: Trust should come from mathematics, not from people.

Every major crypto failure of the past decade โ€” FTX, Celsius, Terra/Luna, Ronin, Wormhole โ€” traces back to human weakness: fraud, greed, social engineering, insider betrayal. The cryptographic primitives were never at fault. The humans managing them were.

Sunima minimizes human trust to the absolute theoretical minimum: the single human co-founder cannot unilaterally access user funds, cannot reverse transactions, cannot mint new tokens, and cannot pause the network. All privileged operations require multi-party consensus from geographically and organizationally distributed participants.

Conviction 2: Privacy is a fundamental right, compliance is a legitimate social contract.

These are not in conflict when implemented correctly. A Swiss bank gives you privacy from your neighbors but cooperates with criminal investigations. Sunima provides the same guarantees, implemented in code rather than in contract law.

Conviction 3: Code is the team. Identity is irrelevant.

Sunima Labs operates without a public team page, without LinkedIn farms, without "meet the founders" sections. We do not believe in the cult of personality. We believe in the cult of verifiable code. Every line is open to scrutiny. Every audit is published. Every protocol decision is recorded on-chain. If you want to know who built Sunima, read the code. If you want to know who is responsible if something breaks, read the protocol โ€” the answer is "nobody, and that is the point."

2.2 Operating Model

Sunima Labs explicitly rejects the traditional crypto founding pattern of public team pages, VC raises, advisory boards, and influencer campaigns. The reasons are practical, not ideological:

The Sunima approach is to publish working code, working contracts, and working audits, then let the community evaluate the protocol on its own merits. We do not announce milestones โ€” we deploy them. We do not promise features โ€” we ship them.

This composition is non-negotiable and is part of the protocol's identity.


3. The Sunima Suite

3.1 Overview

Sunima offers a focused set of privacy-first DeFi primitives. Each is engineered to feel like a familiar product to anyone who has used Ethereum DeFi, but with end-to-end TFHE encryption built in from the ground up. Real liquidity, real users, real fees โ€” and complete confidentiality of amounts, balances, and positions.

The user-facing surface consists of four products. Behind that surface, Sunima follows a defense-in-depth design philosophy: every protocol operation passes through multiple independent validation, authorization, and settlement layers before it touches user funds. The internal organization of these layers, including the specific module boundaries and access control topology, is documented in technical specifications available to verified node runners and protocol auditors. We do not publish the full internal architecture on the public website for the same reason that banks do not publish vault floor plans.

What we do publish โ€” and what every user can verify โ€” is the product surface, the cryptographic guarantees, the governance model, the compliance framework, and the audit results.

3.2 SunimaDEX โ€” Confidential Trading

SunimaDEX is an automated market maker that lets users swap any supported asset against any other with confidential amounts. Functionally, the product feels like Uniswap V2: deposit a pair into a liquidity pool, earn a share of trading fees, swap between assets, withdraw at any time. Cryptographically, every swap amount is encrypted under TFHE before it touches the chain. Observers see that a swap occurred. They do not see the size, the direction, or the resulting balance change.

Liquidity providers earn fees in $SUN, the protocol's native token. Pool ratios are maintained through encrypted arithmetic, so the AMM curve operates correctly without any party โ€” including the protocol itself โ€” observing the underlying values in plaintext.

3.3 SunimaStake โ€” Confidential Yield

SunimaStake is a yield-bearing vault that lets users deposit assets and earn rewards denominated in $SUN. The product is conceptually similar to Pendle, Curve gauges, or any other modern yield protocol: stake, accrue, claim, withdraw. The cryptographic difference is that all balances are stored as TFHE ciphertexts. An observer who reads the contract storage directly learns only the Merkle root of an encrypted balance tree. The individual stakes, the rewards earned, and the claim history are invisible to everyone except the staker.

Reward distribution is computed through encrypted arithmetic. The protocol can prove that rewards were calculated correctly without revealing which addresses earned how much.

3.4 SunimaLend โ€” Confidential Lending

SunimaLend is a lending and borrowing protocol inspired by Compound V3. Users supply assets to earn interest, borrow against collateral, and get liquidated only when their collateralization ratio falls below the protocol's safety margin. The familiar mechanics work as expected.

The cryptographic difference is that position sizes, collateral amounts, and health factors are all encrypted. A liquidator bot scanning the chain cannot identify which positions are at risk by reading the public state. Liquidations are instead triggered through a dedicated authorization flow that grants liquidator bots selective access to specific positions when the encrypted health factor crosses the threshold, without revealing the rest of the user's portfolio.

3.5 SunimaBridge โ€” Confidential Cross-Chain Transfer

SunimaBridge connects Sunima to other major chains (Ethereum, Arbitrum, Base, Fhenix, and others) through a validator attestation model inspired by Wormhole. Messages are signed by a rotating set of validators and verified on destination chains.

The cryptographic difference is that the message contents are encrypted end-to-end. The bridge validators sign attestations of message validity (the message was correctly formed, the source chain confirmed it, the cryptographic proofs are valid) without ever seeing what they are attesting to. This means even a complete compromise of the bridge validator set does not leak user data, and even a colluding majority of validators cannot construct fraudulent transfers without the underlying cryptographic material.

3.6 Defense in Depth

All four products share a common engineering philosophy: defense in depth. Every operation that touches user funds passes through multiple independent layers of validation, each responsible for a specific class of checks:

Each layer is engineered as an independent module with strict access control. A vulnerability discovered in one layer cannot cascade into the others. The full internal topology โ€” module names, function signatures, storage layouts, access control matrices โ€” is published only to verified auditors under standard audit engagement terms. This is intentional. Public disclosure of internal architecture provides material assistance to attackers without providing meaningful benefit to legitimate users, who interact with the protocol exclusively through the four product surfaces described above.

Sunima will publish all third-party audit reports in full, redacting only the specific module identifiers and address derivations that would enable targeted attacks. Users who want maximum verification can run a Sunima node themselves โ€” node runners receive the full technical specification as part of the protocol software.


4. Cryptographic Foundations

4.1 TFHE as the Primary Encryption Scheme

Sunima uses Torus Fully Homomorphic Encryption (TFHE) as its primary cryptographic primitive. TFHE was selected over competing schemes (BFV, BGV, CKKS) based on an explicit optimization criterion: security multiplied by the square of speed.

TFHE's advantages for our use case:

For specific batch-processing workloads (such as AI model inference in encrypted form), Sunima retains the option to use CKKS as a secondary scheme.

4.2 Shielded Pool with Merkle Tree of Notes

User balances are not stored as individual mappings. Instead, they are represented as "notes" in a growing Merkle tree, in the style of Zcash Sapling and Tornado Cash.

Each note contains an encrypted amount (euint64), a commitment to the recipient's stealth address, and a randomized nullifier. When a user deposits into the protocol, a new note is added to the tree. When a user withdraws, the corresponding note is marked as spent via its nullifier. Internal transfers execute by removing one note and adding another.

Key parameters:

4.3 ERC-5564 Stealth Addresses with ERC-4337 Account Abstraction

Every withdrawal from the shielded pool goes to a fresh stealth address derived from the recipient's meta-address. No stealth address is ever reused.

The process:

  1. Bob publishes a meta-address consisting of two public keys: a spending key and a viewing key.
  2. Alice generates a random ephemeral private key.
  3. Alice computes Bob's new stealth address as hash(Bob_spending_pubkey * ephemeral_privkey).
  4. Alice creates a note in the shielded pool referencing this stealth address.
  5. Bob scans the pool's encrypted announcement registry, discovering the note intended for him.
  6. Bob can then spend from the stealth address by deriving the corresponding private key.

This stealth address is deployed as an ERC-4337 smart contract wallet. The wallet is created via CREATE2 at the moment of first use, can automatically forward its contents to a final destination, and can self-destruct in the same transaction (EIP-6780 compatible). This makes stealth addresses truly ephemeral.

The net effect: an external observer sees Alice deposit into a Sunima product contract, and later sees an ephemeral address appear with funds, but cannot cryptographically link the two.

4.4 HYDRA-Fast Stealth Discovery

One historical weakness of stealth address schemes is slow discovery. In Zcash, scanning for incoming notes can take minutes or hours. Sunima solves this with a dedicated off-chain relay network called HYDRA-Fast Stealth: encrypted announcement hints are posted on-chain, a decentralized relay network forwards them to subscribed meta-addresses via WebSocket, and Bob's wallet receives push notifications within 1-2 seconds of the transaction.

This gives users the UX of a traditional bank transfer while preserving the cryptographic privacy of a shielded pool.


5. Quantum-Proof Distributed Custody (QPDC)

5.1 The Custody Problem

Every custodial solution faces the same fundamental question: who holds the keys? The possible answers all have failure modes:

Sunima takes a radically different approach: the master threshold key is never assembled in one place, on any device, at any time. Instead, it exists only as 100 Shamir secret sharing shares, distributed across five independent storage layers, with a threshold of 67 required for reconstruction.

5.2 The Five-Layer Distribution

The 100 shares are allocated as follows:

LayerSharesLocationProtection
1. Node Runners40%Permissionless global networkGeographic distribution across dozens of countries
2. Smart Contracts15%Encrypted blobs on Fhenix, ETH, Arbitrum, BaseProtocol-level encryption
3. User Wallets15%Wallet-derived via HKDFRequires user's private key
4. Founder Server15%Hardware-encrypted persistent diskPhysical access + passphrase
5. Paper & Metal15%Air-gapped backups in multiple locationsQuantum-resistant, fire/water proof

Layer 1 โ€” Node Runners (40 shares). Node runners are permissionless: anyone can download the Sunima node software and run it on a machine anywhere in the world. Node runners are not employees, contractors, or partners of Sunima Labs. They are independent operators, analogous to Bitcoin miners or Ethereum validators. Because node runners are not legalized, licensed, or registered with any jurisdiction, Sunima Labs bears no legal responsibility for where they operate.

Layer 2 โ€” Smart Contract Encryption (15 shares). Encrypted and embedded inside smart contracts on multiple blockchains. Public ciphertext, useless without the decryption key.

Layer 3 โ€” Wallet-Derived User Shares (15 shares). Distributed to high-value depositors via HKDF:

share_i = HKDF(master_share, salt=wallet_address, info="sunima-recovery-v1")

To reconstruct the user's share, one needs both the wallet's private key and the original master share. Neither alone suffices. This binds the security of the protocol to the security of its largest users, creating a structural alignment of incentives.

Layer 4 โ€” Founder Infrastructure (15 shares). Stored on persistent hardware-encrypted storage. RAM, GPU memory, and ephemeral storage are explicitly excluded.

Layer 5 โ€” Paper and Metal Backups (15 shares). Paper printouts in bank safety deposit boxes, steel backup plates (fire and flood resistant), sealed envelopes held by trusted individuals in different countries. Fully air-gapped, quantum-resistant.

5.3 Threshold Reconstruction

To reconstruct the master key, 67 shares must be collected from the five layers in any combination. The Shamir scheme does not distinguish between shares from different layers; it only counts them.

Combinations that succeed:

Combinations that fail:

The critical observation: no single layer contains enough shares to reconstruct the key, and no two layers combined contain enough. Any successful reconstruction requires coordination across at least three of the five layers.

5.4 What QPDC Protects Against

The Sunima QPDC model provides protection against the following adversaries:

The only scenarios in which the protocol could fail are global thermonuclear war, permanent global internet shutdown, or a coordinated attack involving 67%+ of node runners in dozens of countries, the founder personally, multiple trusted individuals, and physical access to paper backups in multiple locations โ€” all executed simultaneously. The mathematical probability of the third scenario is effectively zero.


6. Programmable Compliance

6.1 The Sentinel Architecture

Sunima's compliance engine is called the Sentinel. It is a three-tier monitoring system that observes all transactions on the protocol and makes real-time decisions about whether to allow, flag, or freeze them.

TierImplementationCost/tx% of Traffic
Tier 1 โ€” Static RulesRust, Bloom filters, deterministic rulesFree~99%
Tier 2 โ€” Lightweight MLOllama local (TinyLlama 1B / Phi-3 Mini)~$0.0001~0.9%
Tier 3 โ€” HYDRA Consensus26 specialized attack heads with multi-model verification~$5~0.1%

This tiered approach scales economically: even at 1 million transactions per day, the total compliance cost is bounded at approximately $5,000 per day โ€” orders of magnitude less than the cost of a traditional KYC/AML department at a financial institution.

6.2 The Court Order Gateway

When a law enforcement agency obtains a legitimate court order targeting a specific address on Sunima, they submit the order through the Court Order Gateway โ€” an on-chain contract that accepts signed petitions from pre-registered legal authorities.

The petition must include the jurisdiction, case number, target addresses, legal basis, and a statement of proportionality. Node runners vote on the petition, evaluating the issuing jurisdiction, legal sufficiency, and proportionality of the request.

If 67% of active node runners approve, the relevant shares are assembled and the specific information is decrypted and delivered. The petition, its approval, and its outcome are logged on a public transparency registry.

This process has several important properties:

6.3 Gray Market vs. Black Market

Sunima explicitly distinguishes between gray market and black market activity.

Gray market activity is not flagged or surveilled: unregistered freelance income, cross-border remittances outside formal banking channels, personal privacy in financial matters, business transactions shielded from competitors, individual savings protection in unstable jurisdictions, tax minimization through legal offshore structures. Gray market users are Sunima's primary customer base.

Black market activity is flagged and subject to disclosure: transactions involving OFAC-sanctioned addresses, ransomware payment patterns, terror financing, and transactions linked to specifically identified criminal operations.

The threshold for flagging a transaction as black market is high and based on objective criteria, not subjective judgment.


7. Token Economics

Sunima's native token is SUN. It serves three primary functions: gas payment, staking collateral, and governance voting. Total supply: 100,000,000 SUN, fixed and non-inflationary.

Initial distribution:

AllocationAmountPurpose
Protocol Treasury40%Development, audits, ecosystem grants, liquidity provision
Node Runner Emissions25%Distributed over 10 years as network rewards
Early Adopters15%Airdropped to testnet, beta, and early mainnet users
Founding Allocation10%Vested over 4 years with a 1-year cliff
Liquidity Bootstrapping10%Seed DEX pools and incentivize early LPs

Notable omissions:

Of the protocol's share of all fees, 50% is burned (permanently removed from circulation) and 50% is used to fund the treasury. This creates deflationary pressure on SUN supply as protocol usage grows.


8. Roadmap

Sunima is developed under a focused, sequential build cadence with deliberate phase boundaries. Every milestone ships a verifiable artifact: testnet contracts, audit reports, working demos. Nothing is announced before it is deployed.

PhaseDurationDeliverable
1. Proof of ConceptWeeks 1-4Core protocol primitives v0.1 on Fhenix testnet with end-to-end encrypted deposit, transfer, and withdrawal. Working demo video.
2. MVPWeeks 5-12All four products of the Sunima Suite, ERC-4337 account abstraction, stealth addresses, Sentinel Tier 1, Wallet SDK, private testnet beta
3. Production HardeningWeeks 13-24Full Sentinel, full QPDC, external FHE audit, bug bounty, public testnet with real funds
4. Mainnet LaunchWeeks 25-32Mainnet on Fhenix L2, SUN distribution, node runner onboarding, Court Order Gateway live
5. Own Layer 2Months 8-14Fork of OP Stack with TFHE precompiles, independent sequencer, cross-chain bridges
6. Sunima Layer 1Months 14-24Sunima L1 consensus (Proof of Useful Work), native TFHE in EVM, state migration

9. Risks and Mitigations

We do not hide from risk.


10. Comparison to Existing Projects

Feature Sunima Zcash Monero Tornado Aztec Aleo Fhenix CEX
Privacy by defaultโœ“โœ“โœ“โœ“โœ“โœ“โœ“โœ—
Compliance mechanismโœ“View keys onlyโœ—โœ—โœ—โœ—โœ—โœ“
Court-ordered disclosureโœ“โœ—โœ—โœ—โœ—โœ—โœ—โœ“
FHE encryptionโœ“โœ—โœ—โœ—โœ—โœ—โœ“โœ—
Decentralized custodyโœ“โœ—โœ“โœ“โœ—โœ“โœ—โœ—
Permissionless nodesโœ“โœ“โœ“โœ“โœ—โœ“โœ—โœ—
Quantum-resistant recoveryโœ“โœ—โœ—โœ—โœ—โœ—โœ—โœ—
Protects founder from themselvesโœ“โœ—โœ—โœ—โœ—โœ—โœ—โœ—
AI-built founding teamโœ“โœ—โœ—โœ—โœ—โœ—โœ—โœ—

Sunima is the only solution that provides all nine properties simultaneously.


11. Conclusion

Sunima is an ambitious attempt to resolve one of cryptocurrency's oldest contradictions: the conflict between privacy and compliance. We believe these are not opposing forces but rather two legitimate values that can and should coexist in well-designed financial infrastructure.

Our approach combines proven cryptographic primitives (TFHE, Shamir secret sharing, stealth addresses, Merkle trees) with novel architectural patterns (defense-in-depth product design, the Sentinel compliance engine, Quantum-Proof Distributed Custody) and an uncompromising operating philosophy: code over identity, math over marketing, protocol over people.

We do not claim to have solved all the problems. We acknowledge the significant risks outlined in Section 9. We are aware that our timeline estimates may be optimistic. We know that regulatory attitudes may shift unfavorably.

But we also know that the alternative โ€” continuing to accept the false dichotomy between privacy and compliance โ€” is worse. The current ecosystem forces institutional investors to choose between regulatory safety and privacy, between custody and self-sovereignty, between public transparency and personal discretion. These choices should not be mutually exclusive, and Sunima is our attempt to prove that they are not.

We invite the crypto community, the privacy research community, the legal and regulatory community, and the machine learning community to review our approach, criticize our assumptions, and โ€” if they find merit in what we are building โ€” join us as node runners, depositors, or collaborators.

Sunima is not merely a technical curiosity. It is an argument. An argument that trust should come from mathematics, not from marketing. An argument that privacy and accountability are not opposing values but complementary ones. An argument that the cult of the founder has cost the crypto industry billions of dollars and that the cult of the code is the only sustainable alternative. We are not asking you to believe this argument. We are asking you to watch us make it.

Sunima Chain โ€” The First Compliant Privacy Blockchain
Sunima Labs ยท 2026 ยท Trust from math, not from people