Building the privacy layer of the internet

We are the core technology partners of the Midnight Network, building privacy-enhancing technologies for real-world adoption

We are the core technology partners of the Midnight Network, building privacy-enhancing technologies for real-world adoption

In the news

Who we are

We are pioneers, builders, and innovators who believe utility should not come at the expense of privacy, ownership, and individual autonomy.

Leveraging cutting-edge ZK proofs cryptography, our team of world-class engineers, researchers, and technical experts are the core developers of the Midnight network, pushing the boundaries of blockchain to embed privacy in the very fabric of the internet.

A spinout of Input Output, the engineering powerhouse behind the Cardano network, our team has the know-how and experience in delivering large-scale, enterprise-grade solutions to drive business, while safeguarding the fundamental human freedoms of association, commerce, and expression.

Learn more

Who we are

We are pioneers, builders, and innovators who believe utility should not come at the expense of privacy, ownership, and individual autonomy.

Leveraging cutting-edge ZK proofs cryptography, our team of world-class engineers, researchers, and technical experts are the core developers of the Midnight network, pushing the boundaries of blockchain to embed privacy in the very fabric of the internet.

A spinout of Input Output, the engineering powerhouse behind the Cardano network, our team has the know-how and experience in delivering large-scale, enterprise-grade solutions to drive business, while safeguarding the fundamental human freedoms of association, commerce, and expression.

What we do

Midnight Network

Core contributors, architects, and developers of the Midnight protocol.

Blockchain infrastructure

Full suite of tools, from protocol development to bespoke solutions.

ZK proofs cryptography

Applied cryptography to create systems that provide proofs rather than demand trust.

Open-source development

Prime members of the Linux Foundation Decentralized Trust.

Multi-chain expertise

Technology-agnostic, solutions-oriented development across chains.

Research-driven, business-oriented

Cutting-edge research and development applied to business outcomes.

Midnight Network

Core contributors, architects, and developers of the Midnight protocol.

Blockchain infrastructure

Full suite of tools, from protocol development to bespoke solutions.

ZK proofs cryptography

Applied cryptography to create systems that provide proofs rather than demand trust.

Open-source development

Prime members of the Linux Foundation Decentralized Trust.

Multi-chain expertise

Technology-agnostic, solutions-oriented development across chains.

Research-driven, business-oriented

Cutting-edge research and development applied to business outcomes.

Midnight Network

Midnight is a 4th generation blockchain that leverages zero-knowledge proof technology, a novel dual-state ledger architecture, and innovative tokenomics to power applications that protect both user data and transaction metadata.

Privacy-first architecture

ZK proofs and a dual-state, public-private ledger enable private smart contracts with selective disclosure

Dual-component tokenomics

Sustainable operations and metadata protection driven by the NIGHT token and the DUST resource

Inclusive launch

A broad and engaging multi-phase distribution to seed a diverse community across the Web3 space and beyond

Cooperative tokenomics

Designed for cooperation with other chains, rather than competition, tapping into the security and established infrastructure of other networks

Latest news

Midnight and solving the privacy trilemma: Midnight Summit keynote

In his keynote during the first Midnight Summit, Shielded CTO Bob Blessing-Hartley explains how Midnight solves the issue that prevents privacy from going mainstream.

Announcements
Read more

Making zero-knowledge smart contract development accessible, secure and practical

In this meet-up hosted by the Linux Foundation Decentralized Trust, Shielded principal architect and maintainer of the Minokawa project Kevin Millikin talks about the project's foundations, goals, and future.

Video
Read more

Shielded joins Linux Foundation Decentralized Trust as premier member

The collaboration reinforces our commitment to open-source development and includes our support in contributing Midnight’s smart contract language to the LF Decentralized Trust.

Announcements
Read more

Hello, world. We're Shielded Technologies

Blockchain technologies have emerged to replace systems that demand trust with those that provide proof. At Shielded, we’re building what comes next.

Announcements
Read more

Partners and affiliations

We collaborate with leading organizations to build the future of privacy-preserving technology.

Work with us

We’re hiring! Join a fully remote, global team building the infrastructure for the next generation of the internet.

View open positions

We’re hiring! Join a fully remote, global team building the infrastructure for the next generation of the internet.

Let's build the future of rational privacy

Looking for a partner to build your privacy-preserving application or solution?

Get in touch. Let’s talk.

Frequently asked questions

What are privacy-enhancing technologies?

Privacy-enhancing technologies (PETs) are tools and methods that protect personal data and enable confidential information processing without exposing sensitive details. They include techniques like zero-knowledge proofs, homomorphic encryption, and secure multi-party computation. These technologies allow organizations to gain insights from data, verify credentials, and enable transactions while maintaining privacy—making it possible to balance utility with data protection in ways previously impossible.

What is Shielded Technologies?

Shielded Technologies is an engineering company specializing in privacy-enhancing, decentralized technologies. We're a spinout of Input Output (the team behind Cardano) and serve as the core technology partners for the Midnight Network. Our team combines world-class blockchain expertise with zero-knowledge cryptography to build solutions that protect data privacy while enabling real-world adoption.

What is the Midnight Network?

Midnight is a 4th generation blockchain that leverages zero-knowledge proof technology and a novel dual-state ledger architecture to power applications that protect both user data and transaction metadata. It features rational privacy architecture with selective disclosure, dual-component tokenomics (NIGHT token and DUST resource), and is designed for cooperation with other chains rather than competition.

What services does Shielded offer?

As the core builders of the protocol, our work currently spans three main areas across Midnight: (1) Midnight protocol development—including blockchain ledger, tokenomics architecture, node software, and smart contract language; (2) Network infrastructure operations—managing federated nodes, test networks, and developer documentation; and (3) Ecosystem tooling & capabilities—building essential tools and services that help users generate privacy-preserving proofs.

What makes Shielded unique?

We combine Input Output's proven blockchain heritage with specialized zero-knowledge cryptography expertise. As premier members of the Linux Foundation Decentralized Trust and the Confidential Computing Consortium, we're committed to open-source development and the advancement of privacy-enhancing technologies. Our focus is on building production-ready, regulation-compliant solutions—not laboratory experiments—that embed privacy into the fabric of the internet, starting with the Midnight protocol.

What is zero-knowledge (ZK) proof technology?

Zero-knowledge proofs are cryptographic methods that allow one party to prove to another that something is true without revealing any information beyond the validity of the statement itself. In practical terms, this means you can verify credentials, transactions, or data without exposing sensitive underlying information—creating systems that provide mathematical proof rather than demanding blind trust.

Is Shielded hiring?

We're actively building our global, fully remote team. We're always on the lookout for engineers, researchers, and technologists who are passionate about privacy-enhancing technology and align with our EPIC² values. Visit our Careers page to explore current openings or reach out even if you don't see a perfect match.

How does Shielded approach open-source development?

Open-source collaboration is core to our identity. As premier members of the Linux Foundation Decentralized Trust, we're committed to transparent governance and community-driven innovation. The Midnight protocol is licensed under Apache 2.0, ensuring community ownership and fostering the kind of collaborative ecosystem that drives meaningful technological advancement.

How can my organization partner with Shielded?

We work with organizations looking to build privacy-preserving applications using Midnight network capabilities. If you’re exploring the idea, we'd love to discuss how we can collaborate. Get in touch through our Contact page to start the conversation.

What is selective disclosure?

Selective disclosure is a privacy-preserving technique that enables individuals to disclose specific information for a given interaction while keeping all other personal data confidential. This approach is a practical expression of a broader concept known as rational privacy.

What is rational privacy and why does it matter?

Rational privacy is the idea that privacy shouldn’t be absolute or all-or-nothing—it should be contextual. It recognizes that in many real-world scenarios, users want to share some data to gain access to services or meet legal obligations, but they shouldn't be forced to give up all privacy and security in the process. It’s about striking a balance between personal control, usability, and regulatory compliance.