Binance Square

iExec RLC

image
Verified Creator
Programmable Privacy for Web3.
0 Following
2.8K+ Followers
1.9K+ Liked
240 Shared
Posts
PINNED
·
--
iExec Manifesto: Confidentiality is a Cyber RightI. The Transparency Illusion Blockchain began as a rebellion. Radical transparency was the weapon. Open ledgers were the proof. Visibility was the price of freedom. But rebellions evolve. Today, billions move on-chain daily. Real assets are tokenized. AI agents transact autonomously. DeFi is no longer experimental, it is infrastructural. And yet every transaction, balance, and strategy is broadcast to the world. This is not freedom. It is exposure masquerading as neutrality. No financial system in history has operated with public balances by default. No serious capital can scale while revealing every move. No individual should be forced to disclose economic behavior to participate. Consensus alone does not guarantee fairness. Execution is where asymmetry emerges. Public execution does not remove power. It reallocates it to those with monitoring, latency, and extraction algorithms. This is how MEV becomes structural. And in a world of autonomous agents, automation without confidentiality becomes exploitable automation. Transparency unlocked Web3. Confidential execution will make it viable at scale. II. Beyond Scaling: The New Infrastructure Layer Ethereum is scaling. Gas capacity is increasing. Execution efficiency is improving. Fees are structurally lower. The old assumption that scaling alone defines progress is fading. If block space becomes abundant, block space is no longer the edge. Throughput will not define the next cycle. Capability will. Privacy. Specialized execution. Low-latency confidential workflows. Programmable compliance. Protected financial and business logic. Scaling was phase one. Protected execution is phase two. As L1s grow stronger and L2s evolve, differentiation shifts from “more TPS” to “new primitives.” Confidential execution is that primitive. iExec is not competing for block space. We are extending what block space can do. We are not another L2. We are not another chain. We are the confidential execution infrastructure. Any ecosystem that needs: Confidential balances Private financial and business logic Encrypted RWA workflows Compliance-aware selective disclosure Verifiable off-chain computation We provide it. We extend L1s. We empower L2s. We remain chain and narrative agnostic. Capital moves across chains. Liquidity fragments across ecosystems. Applications interoperate or they disappear. Composability is survival. Private execution without composability is irrelevant. III. Confidentiality Is a Cyber Right Confidentiality is not secrecy. It is not opacity. It is not evasion. It is control. The right to choose: Who sees your data. When they see it. Under what conditions it is disclosed. Self-custody gave users sovereignty over assets. Confidentiality gives them sovereignty over information. A right that exists behind toggles is not a right. If participation requires structural exposure, sovereignty is conditional. A financial system cannot claim neutrality while embedding permanent surveillance into its architecture. Confidentiality must live in infrastructure. Privacy by default. Disclosure only by choice. Composable. Interoperable. Verifiable. Auditable. Not as an add-on, but as a standard. Users should not experience cryptography. They should experience control. Privacy should feel native. Because it is. IV. We Built Before It Was Popular Since 2017, iExec has built privacy-preserving infrastructure. Not because it was trending. Not because it was profitable. Not because it was safe. Because privacy is foundational infrastructure. Confidential computing. Trusted Execution Environments “TEEs”. Secure enclaves. Protected data flows. We focused on execution. Because execution is where power concentrates. If computation cannot be trusted, decentralization is cosmetic. We built while the narrative focused elsewhere. Now the market has caught up. Projects see the friction. Institutions see the risk. Capital sees the limitation. When confidentiality becomes infrastructure, not marketing, pioneers do not pivot, they scale. The market is catching up to a direction we never left. V. The Hard Truth About Privacy Technology Much of today’s privacy infrastructure is impressive. It is also often: Slow. Expensive. Difficult to integrate. Isolated from composable systems. Research-heavy and production-light. Confidential systems that cannot survive real markets will not define the next standard. The objective is not theoretical purity. It is production-grade confidentiality. Operational excellence is non-negotiable. Security is baseline. Reliability is mandatory. Performance is engineered. DeFi does not need theoretical privacy. It needs usable confidentiality. Performance matters. Latency matters. Composability matters. Cost matters. Selective disclosure matters. The future will not wait for perfect math. VI. Why Pragmatism Wins Privacy is not ideology. It is engineering. Zero-knowledge “ZK” systems. Multiparty computation “MPC”. Trusted Execution Environment “TEE”. Each advances the frontier. Each solves different constraints. Each carries trade-offs in latency, cost, complexity, and usability. No single primitive defines the future of confidential finance. The systems that endure will combine strengths intelligently: Cryptography for mathematical guarantees. Distributed mechanisms for trust minimization. Hardware-backed environments for high-performance confidential execution. Today, real markets demand speed. Predictable costs. Composable infrastructure. Hardware-backed confidential execution delivers that now. While some privacy approaches remain computationally heavy or impractical for high-frequency financial workflows, secure enclaves already power production systems at scale. We lead with what works. We integrate what strengthens. We evolve as the ecosystem matures. The objective is not elegance. It is infrastructure that performs under pressure. Confidential DeFi will not be won by abstraction. It will be won by execution. VII. From Vision to Primitive Confidentiality must become programmable. It must integrate into: Transfers. Swaps. Lending. Treasury management. Tokenized assets. Confidentiality should not require a new chain. It should not fragment liquidity. It should not force developers to rewrite their stack. Integration must be simple. APIs clean. SDKs intuitive. Minimal friction. Privacy should enhance blockchain capabilities,  not disrupt them. Multichain by design. Composability by default. Performance-competitive with public transactions. Decentralization without private execution is incomplete. Private execution without composability is irrelevant. VIII. The Standard We build systems that reduce unnecessary trust. We fragment authority by design. We protect sovereignty. We scale without surveillance. We will not sacrifice usability for ideology. We will not sacrifice performance for purity. We will not sacrifice decentralization for convenience. Confidentiality is not a feature. It is infrastructure. It is a cyber right. The next generation of DeFi, RWA, and blockchain ecosystems will be confidential by design. The next financial system will not debate confidentiality. It will assume it. The only question is which infrastructure enables it. We are not adapting to that future. We are building it. Build it confidentially. Build it with us. $RLC #Privacy

iExec Manifesto: Confidentiality is a Cyber Right

I. The Transparency Illusion
Blockchain began as a rebellion.
Radical transparency was the weapon.
Open ledgers were the proof.
Visibility was the price of freedom.
But rebellions evolve.
Today, billions move on-chain daily.
Real assets are tokenized.
AI agents transact autonomously.
DeFi is no longer experimental, it is infrastructural.
And yet every transaction, balance, and strategy is broadcast to the world.
This is not freedom.
It is exposure masquerading as neutrality.
No financial system in history has operated with public balances by default.
No serious capital can scale while revealing every move.
No individual should be forced to disclose economic behavior to participate.
Consensus alone does not guarantee fairness.
Execution is where asymmetry emerges.
Public execution does not remove power.
It reallocates it to those with monitoring, latency, and extraction algorithms.
This is how MEV becomes structural.
And in a world of autonomous agents, automation without confidentiality becomes exploitable automation.
Transparency unlocked Web3.
Confidential execution will make it viable at scale.
II. Beyond Scaling: The New Infrastructure Layer
Ethereum is scaling.
Gas capacity is increasing.
Execution efficiency is improving.
Fees are structurally lower.
The old assumption that scaling alone defines progress is fading.
If block space becomes abundant, block space is no longer the edge.
Throughput will not define the next cycle.
Capability will.
Privacy.
Specialized execution.
Low-latency confidential workflows.
Programmable compliance.
Protected financial and business logic.
Scaling was phase one.
Protected execution is phase two.
As L1s grow stronger and L2s evolve, differentiation shifts from “more TPS” to “new primitives.”
Confidential execution is that primitive.
iExec is not competing for block space.
We are extending what block space can do.
We are not another L2.
We are not another chain.
We are the confidential execution infrastructure.
Any ecosystem that needs:
Confidential balances
Private financial and business logic
Encrypted RWA workflows
Compliance-aware selective disclosure
Verifiable off-chain computation
We provide it.
We extend L1s.
We empower L2s.
We remain chain and narrative agnostic.
Capital moves across chains.
Liquidity fragments across ecosystems.
Applications interoperate or they disappear.
Composability is survival.
Private execution without composability is irrelevant.
III. Confidentiality Is a Cyber Right
Confidentiality is not secrecy.
It is not opacity.
It is not evasion.
It is control.
The right to choose:
Who sees your data.
When they see it.
Under what conditions it is disclosed.
Self-custody gave users sovereignty over assets.
Confidentiality gives them sovereignty over information.
A right that exists behind toggles is not a right.
If participation requires structural exposure, sovereignty is conditional.
A financial system cannot claim neutrality while embedding permanent surveillance into its architecture.
Confidentiality must live in infrastructure.
Privacy by default.
Disclosure only by choice.
Composable.
Interoperable.
Verifiable.
Auditable.
Not as an add-on, but as a standard.
Users should not experience cryptography.
They should experience control.
Privacy should feel native.
Because it is.

IV. We Built Before It Was Popular
Since 2017, iExec has built privacy-preserving infrastructure.
Not because it was trending.
Not because it was profitable.
Not because it was safe.
Because privacy is foundational infrastructure.
Confidential computing.
Trusted Execution Environments “TEEs”.
Secure enclaves.
Protected data flows.
We focused on execution.
Because execution is where power concentrates.
If computation cannot be trusted, decentralization is cosmetic.
We built while the narrative focused elsewhere.
Now the market has caught up.
Projects see the friction.
Institutions see the risk.
Capital sees the limitation.

When confidentiality becomes infrastructure, not marketing, pioneers do not pivot, they scale.
The market is catching up to a direction we never left.
V. The Hard Truth About Privacy Technology
Much of today’s privacy infrastructure is impressive.
It is also often:
Slow.
Expensive.
Difficult to integrate.
Isolated from composable systems.
Research-heavy and production-light.
Confidential systems that cannot survive real markets will not define the next standard.
The objective is not theoretical purity.
It is production-grade confidentiality.
Operational excellence is non-negotiable.
Security is baseline.
Reliability is mandatory.
Performance is engineered.
DeFi does not need theoretical privacy.
It needs usable confidentiality.
Performance matters.
Latency matters.
Composability matters.
Cost matters.
Selective disclosure matters.
The future will not wait for perfect math.
VI. Why Pragmatism Wins
Privacy is not ideology.
It is engineering.
Zero-knowledge “ZK” systems.
Multiparty computation “MPC”.
Trusted Execution Environment “TEE”.
Each advances the frontier.
Each solves different constraints.
Each carries trade-offs in latency, cost, complexity, and usability.
No single primitive defines the future of confidential finance.
The systems that endure will combine strengths intelligently:
Cryptography for mathematical guarantees.
Distributed mechanisms for trust minimization.
Hardware-backed environments for high-performance confidential execution.
Today, real markets demand speed.
Predictable costs.
Composable infrastructure.
Hardware-backed confidential execution delivers that now.
While some privacy approaches remain computationally heavy or impractical for high-frequency financial workflows, secure enclaves already power production systems at scale.
We lead with what works.
We integrate what strengthens.
We evolve as the ecosystem matures.
The objective is not elegance.
It is infrastructure that performs under pressure.
Confidential DeFi will not be won by abstraction.
It will be won by execution.
VII. From Vision to Primitive
Confidentiality must become programmable.
It must integrate into:
Transfers.
Swaps.
Lending.
Treasury management.
Tokenized assets.
Confidentiality should not require a new chain.
It should not fragment liquidity.
It should not force developers to rewrite their stack.
Integration must be simple.
APIs clean.
SDKs intuitive.
Minimal friction.
Privacy should enhance blockchain capabilities,  not disrupt them.
Multichain by design.
Composability by default.
Performance-competitive with public transactions.
Decentralization without private execution is incomplete.
Private execution without composability is irrelevant.
VIII. The Standard
We build systems that reduce unnecessary trust.
We fragment authority by design.
We protect sovereignty.
We scale without surveillance.
We will not sacrifice usability for ideology.
We will not sacrifice performance for purity.
We will not sacrifice decentralization for convenience.
Confidentiality is not a feature.
It is infrastructure.
It is a cyber right.
The next generation of DeFi, RWA, and blockchain ecosystems will be confidential by design.
The next financial system will not debate confidentiality. It will assume it.
The only question is which infrastructure enables it.
We are not adapting to that future.
We are building it.
Build it confidentially.
Build it with us.

$RLC #Privacy
Our TDX hardware now appears in the Proof of Cloud verification tools. That means a valid attestation can now be checked against hardware confirmed in the proofofcloud registry. For confidential workloads, this is what stronger trust looks like in practice: ✅Verifiable execution + Verified hardware provenance. A meaningful step for the programmable privacy behind Confidential DeFi and RWA. $RLC
Our TDX hardware now appears in the Proof of Cloud verification tools.

That means a valid attestation can now be checked against hardware confirmed in the proofofcloud registry.

For confidential workloads, this is what stronger trust looks like in practice:

✅Verifiable execution + Verified hardware provenance.

A meaningful step for the programmable privacy behind Confidential DeFi and RWA.

$RLC
Composable privacy. It’s here. Revealed during EthCC.
Composable privacy.

It’s here. Revealed during EthCC.
Confidential transfers should be as easy as normal transfers. Amounts are encrypted. The transfer is verified onchain without revealing values. Reduce copy trading, front running, and slippage.
Confidential transfers should be as easy as normal transfers.

Amounts are encrypted. The transfer is verified onchain without revealing values.

Reduce copy trading, front running, and slippage.
TDX: The Major Upgrade for Confidential DeFi & RWAIntel TDX removes the constraints that kept confidential computing from being truly production-ready. Instead of forcing applications into tight enclave limits, TDX makes it possible to run full applications, larger workloads, and real financial services inside protected virtual machines. That means better developer experience, fewer architectural compromises, and infrastructure that is finally ready for institutional DeFi, RWA, and more serious capital moving on-chain. DeFi has shown that financial systems can run on open blockchain rails. But full transparency also creates real limits. When every balance, transaction, and position is visible by default, some users and products simply cannot operate as they should. That is especially true for institutional capital, tokenized real-world assets, and financial applications that require discretion, compliance, or controlled access to sensitive information. This is where Intel TDX matters. TDX gives us the foundation to process large-scale workloads and support more serious value moving on-chain For iExec, TDX is not a standalone privacy upgrade. It is a major infrastructure unlock. It gives confidential computing the flexibility, scale, and trust guarantees needed to support institutional DeFi, tokenized real-world assets, and workflows designed for real capital. In simple terms, TDX allows sensitive operations to run inside protected virtual machines called Confidential VMs. In these environments, data stays isolated, and execution cannot be inspected or altered by the host or cloud provider. That creates a stronger foundation for confidential computing, because sensitive logic runs in a Trusted Execution Environment (TEE) designed to preserve both confidentiality and integrity. With TDX, confidential computing becomes production-ready TDX helps move confidential execution from “trust us” to “verify it.” With attestation, users can check that the right code ran in the right environment before their sensitive data was processed. That is a major step for on-chain finance, because privacy only matters if it is backed by strong guarantees. TDX also marks a real maturity step for confidential computing. Earlier approaches were more constrained, harder to integrate, and less suited to production services. TDX gives iExec the flexibility to support full applications, larger workloads, and more complex financial logic inside a protected environment. That is what moves confidential computing from limited experimentation toward infrastructure that is ready for institutional DeFi, tokenized real-world assets, and larger-scale value moving on-chain. Why This Matters for Confidential DeFi That matters directly for Confidential DeFi and RWA. Institutional-grade financial applications are not small or simple. They require infrastructure that can handle more demanding workflows, stricter privacy requirements, and stronger execution guarantees. By moving from enclave-constrained execution to confidential VMs, iExec gains a more credible foundation for institutional DeFi, more robust RWA workflows, and the kind of confidential infrastructure needed to support real capital. What TDX Changes for the Confidential Token For the Confidential Token, this trust layer is especially important. Private balances, private transfers, and selective disclosure only work if the environment handling that data can itself be trusted. TDX helps ensure that sensitive token operations happen inside a protected and verifiable system, without relying on blind trust in the operator. It also supports more workable compliance models, where authorized access is possible without making everything public by default. We are now ready for institutional DeFi and RWA For tokenized real-world assets, it helps support more credible models for investor confidentiality, controlled disclosures, compliance checks, and sensitive offchain data handling. For DeFi, it gives builders a stronger foundation for workflows that depend on both confidentiality and verifiable execution. In both cases, TDX helps make financial logic more workable for serious real-world use. This is why TDX matters beyond infrastructure alone. Together with Remote Attestation and the broader Chain of Trust, it strengthens the foundation for a new class of on-chain financial products. It gives projects a more credible way to support confidentiality, and it gives users stronger guarantees about how their sensitive data is handled. Use Cases Enabled by Verifiable Confidential Execution This opens the door to a range of use cases that benefit from both confidentiality and verifiability: Private transfers become possible because clear values are only handled inside the enclave.Confidential compliance can check rules such as KYC status or transaction limits without exposing personal data.Confidential oracles can process sensitive offchain information before publishing results on-chain.MEV vulnerable flows can be handled inside the confidential environment before broader disclosure, reducing exposure to front-running. These are not just security improvements. They are product capabilities that depend on having a trusted execution layer with enough flexibility to support real application logic. The real shift for Confidential DeFi This is what makes the transition from SGX to TDX a structural upgrade rather than an incremental improvement. The shift is not merely from one secure environment to another, but from enclave-constrained execution under SGX to a confidential computing model with TDX that can support full applications, larger workloads, and more advanced financial services. That is what makes TDX a meaningful unlock for Confidential DeFi and RWA. That is the real shift behind Confidential DeFi and RWA: better control, stronger protection, and production-ready trust infrastructure for institutional use cases and real capital moving privately. Explore the iExec documentation ➡️ https://docs.iex.ec/ $RLC

TDX: The Major Upgrade for Confidential DeFi & RWA

Intel TDX removes the constraints that kept confidential computing from being truly production-ready. Instead of forcing applications into tight enclave limits, TDX makes it possible to run full applications, larger workloads, and real financial services inside protected virtual machines.
That means better developer experience, fewer architectural compromises, and infrastructure that is finally ready for institutional DeFi, RWA, and more serious capital moving on-chain.
DeFi has shown that financial systems can run on open blockchain rails. But full transparency also creates real limits. When every balance, transaction, and position is visible by default, some users and products simply cannot operate as they should.
That is especially true for institutional capital, tokenized real-world assets, and financial applications that require discretion, compliance, or controlled access to sensitive information.
This is where Intel TDX matters.
TDX gives us the foundation to process large-scale workloads and support more serious value moving on-chain
For iExec, TDX is not a standalone privacy upgrade. It is a major infrastructure unlock. It gives confidential computing the flexibility, scale, and trust guarantees needed to support institutional DeFi, tokenized real-world assets, and workflows designed for real capital.
In simple terms, TDX allows sensitive operations to run inside protected virtual machines called Confidential VMs. In these environments, data stays isolated, and execution cannot be inspected or altered by the host or cloud provider. That creates a stronger foundation for confidential computing, because sensitive logic runs in a Trusted Execution Environment (TEE) designed to preserve both confidentiality and integrity.
With TDX, confidential computing becomes production-ready
TDX helps move confidential execution from “trust us” to “verify it.” With attestation, users can check that the right code ran in the right environment before their sensitive data was processed. That is a major step for on-chain finance, because privacy only matters if it is backed by strong guarantees.
TDX also marks a real maturity step for confidential computing. Earlier approaches were more constrained, harder to integrate, and less suited to production services. TDX gives iExec the flexibility to support full applications, larger workloads, and more complex financial logic inside a protected environment. That is what moves confidential computing from limited experimentation toward infrastructure that is ready for institutional DeFi, tokenized real-world assets, and larger-scale value moving on-chain.
Why This Matters for Confidential DeFi
That matters directly for Confidential DeFi and RWA. Institutional-grade financial applications are not small or simple. They require infrastructure that can handle more demanding workflows, stricter privacy requirements, and stronger execution guarantees. By moving from enclave-constrained execution to confidential VMs, iExec gains a more credible foundation for institutional DeFi, more robust RWA workflows, and the kind of confidential infrastructure needed to support real capital.
What TDX Changes for the Confidential Token
For the Confidential Token, this trust layer is especially important. Private balances, private transfers, and selective disclosure only work if the environment handling that data can itself be trusted. TDX helps ensure that sensitive token operations happen inside a protected and verifiable system, without relying on blind trust in the operator. It also supports more workable compliance models, where authorized access is possible without making everything public by default.
We are now ready for institutional DeFi and RWA
For tokenized real-world assets, it helps support more credible models for investor confidentiality, controlled disclosures, compliance checks, and sensitive offchain data handling. For DeFi, it gives builders a stronger foundation for workflows that depend on both confidentiality and verifiable execution. In both cases, TDX helps make financial logic more workable for serious real-world use.
This is why TDX matters beyond infrastructure alone. Together with Remote Attestation and the broader Chain of Trust, it strengthens the foundation for a new class of on-chain financial products. It gives projects a more credible way to support confidentiality, and it gives users stronger guarantees about how their sensitive data is handled.
Use Cases Enabled by Verifiable Confidential Execution
This opens the door to a range of use cases that benefit from both confidentiality and verifiability:
Private transfers become possible because clear values are only handled inside the enclave.Confidential compliance can check rules such as KYC status or transaction limits without exposing personal data.Confidential oracles can process sensitive offchain information before publishing results on-chain.MEV vulnerable flows can be handled inside the confidential environment before broader disclosure, reducing exposure to front-running.
These are not just security improvements. They are product capabilities that depend on having a trusted execution layer with enough flexibility to support real application logic.
The real shift for Confidential DeFi
This is what makes the transition from SGX to TDX a structural upgrade rather than an incremental improvement. The shift is not merely from one secure environment to another, but from enclave-constrained execution under SGX to a confidential computing model with TDX that can support full applications, larger workloads, and more advanced financial services. That is what makes TDX a meaningful unlock for Confidential DeFi and RWA.

That is the real shift behind Confidential DeFi and RWA: better control, stronger protection, and production-ready trust infrastructure for institutional use cases and real capital moving privately.
Explore the iExec documentation ➡️ https://docs.iex.ec/

$RLC
Privacy is the difference between being a user and being a owner.
Privacy is the difference between being a user and being a owner.
Selective disclosure to meet regulatory requirements. You decide who sees your financial data. Grant selective viewership over your full portfolio or a specific token. Your privacy, your rules, live next week.
Selective disclosure to meet regulatory requirements. You decide who sees your financial data.

Grant selective viewership over your full portfolio or a specific token.
Your privacy, your rules, live next week.
$100 trillion in liquidity are waiting for a privacy solution to enter the onchain world Total transparency is a tax that keeps big players away from blockchain. We’ve done the research, and the future of RWA is selective disclosure. Catch the reveal at ETHCC
$100 trillion in liquidity are waiting for a privacy solution to enter the onchain world

Total transparency is a tax that keeps big players away from blockchain.
We’ve done the research, and the future of RWA is selective disclosure.

Catch the reveal at ETHCC
iExec RLC
·
--
Transparency is Blocking Institutional Tokenization
The $100T gap: why transparency is blocking institutional tokenization
At iExec, after months of market research, sector analysis, and 100+ qualitative interviews, one conclusion kept surfacing above everything else: Real World Assets are the next growth engine for crypto, and confidentiality is the structural missing layer blocking them from scaling on-chain. 
The RWA market is booming. And it’s just getting started.
Two years ago, “institutions are coming to DeFi” was still a slogan. Today, it’s a market.
$26.66 billion in tokenized assets are distributed on public blockchains right now. Up 7.5% in the last 30 days alone. 690,000+ unique asset holders. Tokenized assets have made a 15x since the start of 2024. Tokenized US treasury debt hit $11B this month, versus $4.5B last year
Source - rwa.xyz - March 2026
The names moving capital aren’t startups making bets. BlackRock’s BUIDL holds $2B. Franklin Templeton’s BENJI crossed $1B. These are production products, not pilots.

Source - rwa.xyz - March 2026
Blockchain technology offers new market opportunities
The reason institutions are moving is clear: blockchain offers something traditional financial infrastructure cannot.
T+0 settlement instead of T+2.24/7 global access instead of market hours.Programmable compliance instead of manual reconciliation.Fractional ownership that opens asset classes to a broader investor base.
These are structural advantages that change the economics of how assets are issued, distributed, and managed. Institutions are not here for the beauty of the technology,  they are here to capture new market share.
To make this possible, tokenization is the gateway, and the market figures confirm it.
Tokenization is the mechanism by which a real-world asset, whether a treasury, a private credit facility, or a real estate fund, becomes a digital token that can move on public infrastructure, be held in self-custodied wallets, and interact with DeFi protocols.
Tokenization changes who can access an asset, how it settles, and what it can do once it is on-chain. This is why every major financial institution is watching, and why the ones who have committed are scaling.
And yet the addressable market is estimated at $100 trillion (iExec GTM analysis from multiple sources, including defillama, dune x RWA report and Boston Consulting Group report). Today, $27B has made it on-chain. That’s 0.027%.
The missing layer is confidentiality. Here is why.
The confidentiality problem is what’s holding RWA back
When a fund manager tokenizes a position on a public blockchain, every investor's balance, every subscription amount, and every redemption flow becomes visible to anyone with a block explorer. In traditional finance, none of this is public. Keeping it private is not optional; it is a legal obligation in most jurisdictions.
In practice, this creates problems for any institution that tries to tokenize. To understand this better, we ran 100+ qualitative interviews across Europe, APAC, and LATAM with fund operators, compliance experts, and builders. Here are the key takeaways.
Competitors can see your positions and copy your strategy.
We identified that full transparency is operationally incompatible with institutional mandates, not because institutions want to hide from oversight, but because their legal obligations require them to protect investor data, and their competitive position depends on protecting strategy.
Regulators require investor data to stay private by law.
We identified that compliance is the unlock, not the barrier. Institutions gain confidence to adopt confidential infrastructure when it comes with a demonstrated compliance architecture. The product that shows regulators exactly what they need to see is the product that gets integrated.
Confidentiality is different from anonymity.
We identified that the fear of being misinterpreted as non-compliant limits adoption more than any technical friction. Institutions don’t avoid privacy tools because the cryptography is wrong. They avoid them because the tools signal the wrong intent: anonymity rather than selective disclosure, opacity rather than controlled visibility.
Selective disclosure is the key.
Institutions don’t want opacity. They want control over who sees what. The ability to be confidential to the market and auditable to regulators at the same time. Not hidden from everyone. Not visible to everyone. Selective disclosure is the winning privacy model.
iExec will power the next cycle of institutional crypto adoption
Months of research. Hundreds of interviews. One conclusion: the missing layer is confidentiality, and it is the only thing standing between today's $27B and the $100T addressable market.
As one institutional DeFi infrastructure builder put it: "If institutions are moving billions on-chain, they don't want to announce it to everyone. Confidentiality at scale equals competitive survival, not secrecy."
Our Confidential Token is iExec's answer to that gap. Built for institutions and RWA players who need the benefits of blockchain without the exposure they're legally and competitively obligated to avoid.
The solution is to be released next week at ETHCC Cannes.
Stay tuned.

$RLC
function unwrap( address from, address to, bytes32 encryptedAmount, bytes inputProof ) extrenal Encrypting and decrypting power at your fingertips. Showcased next week.
function unwrap(
address from, address to,
bytes32 encryptedAmount, bytes inputProof
) extrenal

Encrypting and decrypting power at your fingertips.
Showcased next week.
Transparency is Blocking Institutional TokenizationThe $100T gap: why transparency is blocking institutional tokenization At iExec, after months of market research, sector analysis, and 100+ qualitative interviews, one conclusion kept surfacing above everything else: Real World Assets are the next growth engine for crypto, and confidentiality is the structural missing layer blocking them from scaling on-chain.  The RWA market is booming. And it’s just getting started. Two years ago, “institutions are coming to DeFi” was still a slogan. Today, it’s a market. $26.66 billion in tokenized assets are distributed on public blockchains right now. Up 7.5% in the last 30 days alone. 690,000+ unique asset holders. Tokenized assets have made a 15x since the start of 2024. Tokenized US treasury debt hit $11B this month, versus $4.5B last year Source - rwa.xyz - March 2026 The names moving capital aren’t startups making bets. BlackRock’s BUIDL holds $2B. Franklin Templeton’s BENJI crossed $1B. These are production products, not pilots. Source - rwa.xyz - March 2026 Blockchain technology offers new market opportunities The reason institutions are moving is clear: blockchain offers something traditional financial infrastructure cannot. T+0 settlement instead of T+2.24/7 global access instead of market hours.Programmable compliance instead of manual reconciliation.Fractional ownership that opens asset classes to a broader investor base. These are structural advantages that change the economics of how assets are issued, distributed, and managed. Institutions are not here for the beauty of the technology,  they are here to capture new market share. To make this possible, tokenization is the gateway, and the market figures confirm it. Tokenization is the mechanism by which a real-world asset, whether a treasury, a private credit facility, or a real estate fund, becomes a digital token that can move on public infrastructure, be held in self-custodied wallets, and interact with DeFi protocols. Tokenization changes who can access an asset, how it settles, and what it can do once it is on-chain. This is why every major financial institution is watching, and why the ones who have committed are scaling. And yet the addressable market is estimated at $100 trillion (iExec GTM analysis from multiple sources, including defillama, dune x RWA report and Boston Consulting Group report). Today, $27B has made it on-chain. That’s 0.027%. The missing layer is confidentiality. Here is why. The confidentiality problem is what’s holding RWA back When a fund manager tokenizes a position on a public blockchain, every investor's balance, every subscription amount, and every redemption flow becomes visible to anyone with a block explorer. In traditional finance, none of this is public. Keeping it private is not optional; it is a legal obligation in most jurisdictions. In practice, this creates problems for any institution that tries to tokenize. To understand this better, we ran 100+ qualitative interviews across Europe, APAC, and LATAM with fund operators, compliance experts, and builders. Here are the key takeaways. Competitors can see your positions and copy your strategy. We identified that full transparency is operationally incompatible with institutional mandates, not because institutions want to hide from oversight, but because their legal obligations require them to protect investor data, and their competitive position depends on protecting strategy. Regulators require investor data to stay private by law. We identified that compliance is the unlock, not the barrier. Institutions gain confidence to adopt confidential infrastructure when it comes with a demonstrated compliance architecture. The product that shows regulators exactly what they need to see is the product that gets integrated. Confidentiality is different from anonymity. We identified that the fear of being misinterpreted as non-compliant limits adoption more than any technical friction. Institutions don’t avoid privacy tools because the cryptography is wrong. They avoid them because the tools signal the wrong intent: anonymity rather than selective disclosure, opacity rather than controlled visibility. Selective disclosure is the key. Institutions don’t want opacity. They want control over who sees what. The ability to be confidential to the market and auditable to regulators at the same time. Not hidden from everyone. Not visible to everyone. Selective disclosure is the winning privacy model. iExec will power the next cycle of institutional crypto adoption Months of research. Hundreds of interviews. One conclusion: the missing layer is confidentiality, and it is the only thing standing between today's $27B and the $100T addressable market. As one institutional DeFi infrastructure builder put it: "If institutions are moving billions on-chain, they don't want to announce it to everyone. Confidentiality at scale equals competitive survival, not secrecy." Our Confidential Token is iExec's answer to that gap. Built for institutions and RWA players who need the benefits of blockchain without the exposure they're legally and competitively obligated to avoid. The solution is to be released next week at ETHCC Cannes. Stay tuned. $RLC

Transparency is Blocking Institutional Tokenization

The $100T gap: why transparency is blocking institutional tokenization
At iExec, after months of market research, sector analysis, and 100+ qualitative interviews, one conclusion kept surfacing above everything else: Real World Assets are the next growth engine for crypto, and confidentiality is the structural missing layer blocking them from scaling on-chain. 
The RWA market is booming. And it’s just getting started.
Two years ago, “institutions are coming to DeFi” was still a slogan. Today, it’s a market.
$26.66 billion in tokenized assets are distributed on public blockchains right now. Up 7.5% in the last 30 days alone. 690,000+ unique asset holders. Tokenized assets have made a 15x since the start of 2024. Tokenized US treasury debt hit $11B this month, versus $4.5B last year
Source - rwa.xyz - March 2026
The names moving capital aren’t startups making bets. BlackRock’s BUIDL holds $2B. Franklin Templeton’s BENJI crossed $1B. These are production products, not pilots.

Source - rwa.xyz - March 2026
Blockchain technology offers new market opportunities
The reason institutions are moving is clear: blockchain offers something traditional financial infrastructure cannot.
T+0 settlement instead of T+2.24/7 global access instead of market hours.Programmable compliance instead of manual reconciliation.Fractional ownership that opens asset classes to a broader investor base.
These are structural advantages that change the economics of how assets are issued, distributed, and managed. Institutions are not here for the beauty of the technology,  they are here to capture new market share.
To make this possible, tokenization is the gateway, and the market figures confirm it.
Tokenization is the mechanism by which a real-world asset, whether a treasury, a private credit facility, or a real estate fund, becomes a digital token that can move on public infrastructure, be held in self-custodied wallets, and interact with DeFi protocols.
Tokenization changes who can access an asset, how it settles, and what it can do once it is on-chain. This is why every major financial institution is watching, and why the ones who have committed are scaling.
And yet the addressable market is estimated at $100 trillion (iExec GTM analysis from multiple sources, including defillama, dune x RWA report and Boston Consulting Group report). Today, $27B has made it on-chain. That’s 0.027%.
The missing layer is confidentiality. Here is why.
The confidentiality problem is what’s holding RWA back
When a fund manager tokenizes a position on a public blockchain, every investor's balance, every subscription amount, and every redemption flow becomes visible to anyone with a block explorer. In traditional finance, none of this is public. Keeping it private is not optional; it is a legal obligation in most jurisdictions.
In practice, this creates problems for any institution that tries to tokenize. To understand this better, we ran 100+ qualitative interviews across Europe, APAC, and LATAM with fund operators, compliance experts, and builders. Here are the key takeaways.
Competitors can see your positions and copy your strategy.
We identified that full transparency is operationally incompatible with institutional mandates, not because institutions want to hide from oversight, but because their legal obligations require them to protect investor data, and their competitive position depends on protecting strategy.
Regulators require investor data to stay private by law.
We identified that compliance is the unlock, not the barrier. Institutions gain confidence to adopt confidential infrastructure when it comes with a demonstrated compliance architecture. The product that shows regulators exactly what they need to see is the product that gets integrated.
Confidentiality is different from anonymity.
We identified that the fear of being misinterpreted as non-compliant limits adoption more than any technical friction. Institutions don’t avoid privacy tools because the cryptography is wrong. They avoid them because the tools signal the wrong intent: anonymity rather than selective disclosure, opacity rather than controlled visibility.
Selective disclosure is the key.
Institutions don’t want opacity. They want control over who sees what. The ability to be confidential to the market and auditable to regulators at the same time. Not hidden from everyone. Not visible to everyone. Selective disclosure is the winning privacy model.
iExec will power the next cycle of institutional crypto adoption
Months of research. Hundreds of interviews. One conclusion: the missing layer is confidentiality, and it is the only thing standing between today's $27B and the $100T addressable market.
As one institutional DeFi infrastructure builder put it: "If institutions are moving billions on-chain, they don't want to announce it to everyone. Confidentiality at scale equals competitive survival, not secrecy."
Our Confidential Token is iExec's answer to that gap. Built for institutions and RWA players who need the benefits of blockchain without the exposure they're legally and competitively obligated to avoid.
The solution is to be released next week at ETHCC Cannes.
Stay tuned.

$RLC
The newest Messari Crypto report outlined TEEs, Decentralized Confidential Computing, Compliance and Privacy. Proud to be a member of the DeCC Alliance as one of the leading TEE providers alongside other industry pioneers! Full report available in the replies 👇 $RLC
The newest Messari Crypto report outlined TEEs, Decentralized Confidential Computing, Compliance and Privacy.

Proud to be a member of the DeCC Alliance as one of the leading TEE providers alongside other industry pioneers!

Full report available in the replies
👇
$RLC
Wrap your ERC-20 token into a confidential, auditable asset. Unwrap it back to a public ERC-20 when needed. Putting the final touches in❇️ Going live next week. $RLC
Wrap your ERC-20 token into a confidential, auditable asset. Unwrap it back to a public ERC-20 when needed.

Putting the final touches in❇️

Going live next week.

$RLC
Privacy, the last piece of the blockchain puzzle🧩
Privacy, the last piece of the blockchain puzzle🧩
We’re officially launching the iExec Tech Ambassador program tooday at 17:00 UTC. Join Martin Leclerq as he showcases: - The program vision & role - Our first lineup of tech ambassadors TechWrestleMami & DelforgeJules - Upcoming activities
We’re officially launching the iExec Tech Ambassador program tooday at 17:00 UTC.

Join Martin Leclerq as he showcases:
- The program vision & role
- Our first lineup of tech ambassadors TechWrestleMami & DelforgeJules
- Upcoming activities
Quoted content has been removed
Confidential DeFi should be in everyone's hands. Composable, Scalable, Auditable. Next week at ETHCC
Confidential DeFi should be in everyone's hands.

Composable, Scalable, Auditable.
Next week at ETHCC
Community has always been at the heart of iExec. We are proud to unveil The iExec Ambassadors Program, a tech and developer led initiative for the builders and curious minds in our ecosystem. Read more about the program here 👇
Community has always been at the heart of iExec.

We are proud to unveil The iExec Ambassadors Program, a tech and developer led initiative for the builders and curious minds in our ecosystem.

Read more about the program here 👇
iExec RLC
·
--
Introducing iExec Ambassador
At iExec, community has always been a core part of how the ecosystem grows. From developers experimenting with new use cases, to contributors sharing knowledge, organizing events, and helping others get started, the iExec community has consistently pushed the ecosystem forward.
As the ecosystem continues to mature, we’ve seen a growing number of community members who want to go further. People who don’t just follow updates, but actively build, teach, organize, and connect others around iExec.
iExec is thrilled to unveil iExec Ambassador, a key initiative towards building a global community around this groundbreaking technology.
A community-led initiative
iExec Ambassador is a community-led initiative supported by iExec, designed to bring together contributors who take an active role in growing the iExec ecosystem.
It brings together builders, developers, creatives, and community members who contribute through real actions: building and testing applications, creating content, organizing events, engaging local and online communities, and sharing feedback with the iExec team.
iExec Ambassador is not a traditional ambassador program. It is a global network of contributors who are already involved in the ecosystem and want to increase their impact over time.
How iExec Ambassador contributes
iExec Ambassador are deeply involved in the life of the ecosystem. They help shape how iExec is understood, used, and adopted by contributing where it matters most.
Some focus on building and experimenting with the iExec stack, sharing technical learnings, and providing valuable feedback based on hands-on experience. Others play a key role in community growth by organizing meetups, workshops, or hackathons, creating educational content, and supporting developers and newcomers.
What connects all iExec Ambassador members is a shared commitment to growing the ecosystem through consistent, meaningful contributions.
Local Community Leaders
Are you passionate about organizing events, building strong local communities, and helping others discover new technologies?
iExec Ambassador play a key role in growing the iExec ecosystem by activating local communities, hosting meetups and workshops, and creating welcoming spaces for developers and contributors to connect and collaborate.
As a Local Community Leader, you become a catalyst for iExec’s growth in your region, helping plant the seeds of the ecosystem and supporting its development over time.
Why iExec Ambassador exists
As iExec grows globally, no single team can be everywhere at once. iExec Ambassador exists to empower community members who are already taking initiative and give them the structure, support, and visibility needed to grow their impact.
Through closer collaboration with the iExec team, access to resources, and connection with other contributors worldwide, iExec Ambassador members help strengthen the ecosystem while growing their own experience and network.
iExec Ambassador is open to contributors who want to take an active role in the iExec ecosystem and contribute over the long term.
The enthusiasm and eagerness from our community to contribute is truly inspiring. We’re thrilled about the prospect of embarking on this exciting journey together with you!
Introducing iExec AmbassadorAt iExec, community has always been a core part of how the ecosystem grows. From developers experimenting with new use cases, to contributors sharing knowledge, organizing events, and helping others get started, the iExec community has consistently pushed the ecosystem forward. As the ecosystem continues to mature, we’ve seen a growing number of community members who want to go further. People who don’t just follow updates, but actively build, teach, organize, and connect others around iExec. iExec is thrilled to unveil iExec Ambassador, a key initiative towards building a global community around this groundbreaking technology. A community-led initiative iExec Ambassador is a community-led initiative supported by iExec, designed to bring together contributors who take an active role in growing the iExec ecosystem. It brings together builders, developers, creatives, and community members who contribute through real actions: building and testing applications, creating content, organizing events, engaging local and online communities, and sharing feedback with the iExec team. iExec Ambassador is not a traditional ambassador program. It is a global network of contributors who are already involved in the ecosystem and want to increase their impact over time. How iExec Ambassador contributes iExec Ambassador are deeply involved in the life of the ecosystem. They help shape how iExec is understood, used, and adopted by contributing where it matters most. Some focus on building and experimenting with the iExec stack, sharing technical learnings, and providing valuable feedback based on hands-on experience. Others play a key role in community growth by organizing meetups, workshops, or hackathons, creating educational content, and supporting developers and newcomers. What connects all iExec Ambassador members is a shared commitment to growing the ecosystem through consistent, meaningful contributions. Local Community Leaders Are you passionate about organizing events, building strong local communities, and helping others discover new technologies? iExec Ambassador play a key role in growing the iExec ecosystem by activating local communities, hosting meetups and workshops, and creating welcoming spaces for developers and contributors to connect and collaborate. As a Local Community Leader, you become a catalyst for iExec’s growth in your region, helping plant the seeds of the ecosystem and supporting its development over time. Why iExec Ambassador exists As iExec grows globally, no single team can be everywhere at once. iExec Ambassador exists to empower community members who are already taking initiative and give them the structure, support, and visibility needed to grow their impact. Through closer collaboration with the iExec team, access to resources, and connection with other contributors worldwide, iExec Ambassador members help strengthen the ecosystem while growing their own experience and network. iExec Ambassador is open to contributors who want to take an active role in the iExec ecosystem and contribute over the long term. The enthusiasm and eagerness from our community to contribute is truly inspiring. We’re thrilled about the prospect of embarking on this exciting journey together with you!

Introducing iExec Ambassador

At iExec, community has always been a core part of how the ecosystem grows. From developers experimenting with new use cases, to contributors sharing knowledge, organizing events, and helping others get started, the iExec community has consistently pushed the ecosystem forward.
As the ecosystem continues to mature, we’ve seen a growing number of community members who want to go further. People who don’t just follow updates, but actively build, teach, organize, and connect others around iExec.
iExec is thrilled to unveil iExec Ambassador, a key initiative towards building a global community around this groundbreaking technology.
A community-led initiative
iExec Ambassador is a community-led initiative supported by iExec, designed to bring together contributors who take an active role in growing the iExec ecosystem.
It brings together builders, developers, creatives, and community members who contribute through real actions: building and testing applications, creating content, organizing events, engaging local and online communities, and sharing feedback with the iExec team.
iExec Ambassador is not a traditional ambassador program. It is a global network of contributors who are already involved in the ecosystem and want to increase their impact over time.
How iExec Ambassador contributes
iExec Ambassador are deeply involved in the life of the ecosystem. They help shape how iExec is understood, used, and adopted by contributing where it matters most.
Some focus on building and experimenting with the iExec stack, sharing technical learnings, and providing valuable feedback based on hands-on experience. Others play a key role in community growth by organizing meetups, workshops, or hackathons, creating educational content, and supporting developers and newcomers.
What connects all iExec Ambassador members is a shared commitment to growing the ecosystem through consistent, meaningful contributions.
Local Community Leaders
Are you passionate about organizing events, building strong local communities, and helping others discover new technologies?
iExec Ambassador play a key role in growing the iExec ecosystem by activating local communities, hosting meetups and workshops, and creating welcoming spaces for developers and contributors to connect and collaborate.
As a Local Community Leader, you become a catalyst for iExec’s growth in your region, helping plant the seeds of the ecosystem and supporting its development over time.
Why iExec Ambassador exists
As iExec grows globally, no single team can be everywhere at once. iExec Ambassador exists to empower community members who are already taking initiative and give them the structure, support, and visibility needed to grow their impact.
Through closer collaboration with the iExec team, access to resources, and connection with other contributors worldwide, iExec Ambassador members help strengthen the ecosystem while growing their own experience and network.
iExec Ambassador is open to contributors who want to take an active role in the iExec ecosystem and contribute over the long term.
The enthusiasm and eagerness from our community to contribute is truly inspiring. We’re thrilled about the prospect of embarking on this exciting journey together with you!
Selective disclosure completes composable DeFi. You can snap building blocks together to build a strategy in one click. It lets you use those blocks without showing everyone your bank balance. It’s the efficiency of DeFi with the privacy of a VIP room.
Selective disclosure completes composable DeFi.

You can snap building blocks together to build a strategy in one click.
It lets you use those blocks without showing everyone your bank balance.

It’s the efficiency of DeFi with the privacy of a VIP room.
"Who's your privacy provider?" Will be one of the most asked question in the future
"Who's your privacy provider?"

Will be one of the most asked question in the future
Fryderyk Kempisty is spot on here, privacy isn't just a technical spec, it’s a fundamental human right.
Fryderyk Kempisty is spot on here, privacy isn't just a technical spec, it’s a fundamental human right.
iExec RLC
·
--
The people helping us communicate our messages with you better answered our famous question:

Why does privacy matter to you?
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number
Sitemap
Cookie Preferences
Platform T&Cs