zkSnip

Addressless Private Payments

Settlement infra for addressless payments, bidirectional anonymity, and decentralized compliance.

Read the Architecture

Payments Without Wallet Addresses

Share a one-time claim code

Snip Code

SNIP in Action

ADDRESSLESS TRANSFER •
EXPIRY BEFORE GENERATION

1. SET AMOUNT

2. GENERATE SNIP

3. SHARE SNIP TO RECIPIENT

Traditional System

Entry Visible • Exit Delayed •
Graph Forms Over Time

Traditional System Diagram

Result: Graph Accumulates

Graph Accumulates

Snip System

ADDRESSLESS TRANSFER •
EXPIRY BEFORE GENERATION

hidden

Deposit

Funds enter a shared pool with others

Shielded Pool

Choose amount

Choose expiry

Generate one-time claim code

Snip Code

• one-time
• off-chain
• expires by time
SNIP – X7F9-Q2A
SNIP Code Glow

Claim

EXIT ENTROPY

K+1 indistinguishable claims

Optional
policy proof

Sanctions
& policy proofs

Optional compliance (on demand).
Zero Policy • Accumulator Roots •
Decentralized Operators

Allowed

Not Sanctioned

Policy Satisfied

Result: No Graph

No Graph

Veil Execution Substrate
Infrastructure Primitives

Addressless
Payments:

Wallet addresses are replaced by
short-lived claim codes.

Bidirectional
Anonymity:

Uncertainty is enforced at
both deposit and claim
events.

Selective compliance
on demand:

Optional, cryptographically enforced compliance via decentralized zero-
knowledge accumulators—no identities, no surveillance, no trusted intermediaries.

Yield-Bearing
Privacy:

Protocol fees fund protocol-level
privacy amplification, causing
anonymity guarantees to strengthen
as usage increases.

Aligned Operators

Batched Deposits

SNIP-4F9A-K2Q7
SNIP Code Glow

expires in 60s

K+1 Claims

Entry entropy + Exit entropy

ZK COPROCESSOR

Verify Amplification
Enforce Liveness Settle Payouts

Live

Usage → Fees → Amplification →Anonymity
Usage

Allowed

Policy Satisfied

Not Sanctioned

Veil amplifiers + bidirectional anonymity

Entry Entropy x EXIT Entropy → Graph suppression at formation

Veil Amplifiers Deposit Side
Veil Amplifiers Claim Side

bidirectional anonymity. Attacker must guess Entry x Exit

Apply to the Founding Operator Set

Veil Amplification + Sentinel Accumulator proofs,run by the same bonded operators.

Founding Operator Set Diagram

©2026 ZKSNIP. All rights reserved.