


Building the privacy layer of the internet

In the news
Who we are
We are pioneers, builders, and innovators who believe utility should not come at the expense of privacy, ownership, and individual autonomy.
Leveraging cutting-edge ZK proofs cryptography, our team of world-class engineers, researchers, and technical experts are the core developers of the Midnight network, pushing the boundaries of blockchain to embed privacy in the very fabric of the internet.
A spinout of Input Output, the engineering powerhouse behind the Cardano network, our team has the know-how and experience in delivering large-scale, enterprise-grade solutions to drive business, while safeguarding the fundamental human freedoms of association, commerce, and expression.
What we do
Midnight Network
Core contributors, architects, and developers of the Midnight protocol.
Blockchain infrastructure
Full suite of tools, from protocol development to bespoke solutions.
ZK proofs cryptography
Applied cryptography to create systems that provide proofs rather than demand trust.
Open-source development
Prime members of the Linux Foundation Decentralized Trust.
Multi-chain expertise
Technology-agnostic, solutions-oriented development across chains.
Research-driven, business-oriented
Cutting-edge research and development applied to business outcomes.
Midnight Network
Midnight is a 4th generation blockchain that leverages zero-knowledge proof technology, a novel dual-state ledger architecture, and innovative tokenomics to power applications that protect both user data and transaction metadata.
Privacy-first architecture
ZK proofs and a dual-state, public-private ledger enable private smart contracts with selective disclosure
Dual-component tokenomics
Sustainable operations and metadata protection driven by the NIGHT token and the DUST resource
Inclusive launch
A broad and engaging multi-phase distribution to seed a diverse community across the Web3 space and beyond
Cooperative tokenomics
Designed for cooperation with other chains, rather than competition, tapping into the security and established infrastructure of other networks
Latest news

Midnight and solving the privacy trilemma: Midnight Summit keynote
In his keynote during the first Midnight Summit, Shielded CTO Bob Blessing-Hartley explains how Midnight solves the issue that prevents privacy from going mainstream.

Making zero-knowledge smart contract development accessible, secure and practical
In this meet-up hosted by the Linux Foundation Decentralized Trust, Shielded principal architect and maintainer of the Minokawa project Kevin Millikin talks about the project's foundations, goals, and future.

Shielded joins Linux Foundation Decentralized Trust as premier member
The collaboration reinforces our commitment to open-source development and includes our support in contributing Midnight’s smart contract language to the LF Decentralized Trust.

Hello, world. We're Shielded Technologies
Blockchain technologies have emerged to replace systems that demand trust with those that provide proof. At Shielded, we’re building what comes next.
Partners and affiliations
We collaborate with leading organizations to build the future of privacy-preserving technology.
Work with us
We’re hiring! Join a fully remote, global team building the infrastructure for the next generation of the internet.
Let's build the future of rational privacy
Looking for a partner to build your privacy-preserving application or solution?
Get in touch. Let’s talk.
Frequently asked questions
What are privacy-enhancing technologies?
Privacy-enhancing technologies (PETs) are tools and methods that protect personal data and enable confidential information processing without exposing sensitive details. They include techniques like zero-knowledge proofs, homomorphic encryption, and secure multi-party computation. These technologies allow organizations to gain insights from data, verify credentials, and enable transactions while maintaining privacy—making it possible to balance utility with data protection in ways previously impossible.
What is Shielded Technologies?
Shielded Technologies is an engineering company specializing in privacy-enhancing, decentralized technologies. We're a spinout of Input Output (the team behind Cardano) and serve as the core technology partners for the Midnight Network. Our team combines world-class blockchain expertise with zero-knowledge cryptography to build solutions that protect data privacy while enabling real-world adoption.
What is the Midnight Network?
Midnight is a 4th generation blockchain that leverages zero-knowledge proof technology and a novel dual-state ledger architecture to power applications that protect both user data and transaction metadata. It features rational privacy architecture with selective disclosure, dual-component tokenomics (NIGHT token and DUST resource), and is designed for cooperation with other chains rather than competition.
What services does Shielded offer?
As the core builders of the protocol, our work currently spans three main areas across Midnight: (1) Midnight protocol development—including blockchain ledger, tokenomics architecture, node software, and smart contract language; (2) Network infrastructure operations—managing federated nodes, test networks, and developer documentation; and (3) Ecosystem tooling & capabilities—building essential tools and services that help users generate privacy-preserving proofs.
What makes Shielded unique?
We combine Input Output's proven blockchain heritage with specialized zero-knowledge cryptography expertise. As premier members of the Linux Foundation Decentralized Trust and the Confidential Computing Consortium, we're committed to open-source development and the advancement of privacy-enhancing technologies. Our focus is on building production-ready, regulation-compliant solutions—not laboratory experiments—that embed privacy into the fabric of the internet, starting with the Midnight protocol.
What is zero-knowledge (ZK) proof technology?
Zero-knowledge proofs are cryptographic methods that allow one party to prove to another that something is true without revealing any information beyond the validity of the statement itself. In practical terms, this means you can verify credentials, transactions, or data without exposing sensitive underlying information—creating systems that provide mathematical proof rather than demanding blind trust.
Is Shielded hiring?
We're actively building our global, fully remote team. We're always on the lookout for engineers, researchers, and technologists who are passionate about privacy-enhancing technology and align with our EPIC² values. Visit our Careers page to explore current openings or reach out even if you don't see a perfect match.
How does Shielded approach open-source development?
Open-source collaboration is core to our identity. As premier members of the Linux Foundation Decentralized Trust, we're committed to transparent governance and community-driven innovation. The Midnight protocol is licensed under Apache 2.0, ensuring community ownership and fostering the kind of collaborative ecosystem that drives meaningful technological advancement.
How can my organization partner with Shielded?
We work with organizations looking to build privacy-preserving applications using Midnight network capabilities. If you’re exploring the idea, we'd love to discuss how we can collaborate. Get in touch through our Contact page to start the conversation.
What is selective disclosure?
Selective disclosure is a privacy-preserving technique that enables individuals to disclose specific information for a given interaction while keeping all other personal data confidential. This approach is a practical expression of a broader concept known as rational privacy.
What is rational privacy and why does it matter?
Rational privacy is the idea that privacy shouldn’t be absolute or all-or-nothing—it should be contextual. It recognizes that in many real-world scenarios, users want to share some data to gain access to services or meet legal obligations, but they shouldn't be forced to give up all privacy and security in the process. It’s about striking a balance between personal control, usability, and regulatory compliance.