Money Wiki

Secret Network (SCRT)

Share:

The initial concept was clever: Ethereum executes publicly, so Enigma proposed off-chain encrypted computation coordinated through smart contracts. But coordinating privacy off-chain was complicated. They eventually realized they needed their own blockchain with privacy built into the core protocol.

Ticker

SCRT

Layer

L1

Consensus

Proof-of-Stake (Tendermint)

Issuer

Secret Network Foundation

Launched

2020

Status

Active

Live Market Data

Price

$0.101785

Market Cap

$34.37M

24h Volume

$5.74M

24h Change

-1.20%

Data from CoinGecko. Refreshed hourly.

Opening

Secret Network is the only Layer 1 blockchain that encrypts smart contract inputs, outputs, and internal state using hardware security modules. MIT graduates Can Kisagun and Guy Zyskind founded Enigma in 2017 to solve a fundamental problem: Ethereum and Bitcoin record everything on-chain, which means privacy is impossible. Their solution leverages Intel SGX (Software Guard Extension) to encrypt code execution while preserving verifiability—the network can prove a computation was correct without revealing what the computation was.

Launched as Enigma in February 2020 and rebranded to Secret Network five months later, the network runs Cosmos SDK infrastructure with Tendermint consensus. Unlike privacy coins like Monero that scramble transactions, or zero-knowledge platforms that add privacy as a feature, Secret Network makes privacy native to smart contracts. Developers write contracts that operate on encrypted data; the network proves execution correctness without exposing sensitive inputs.

As of April 2026, Secret Network sits at $28.7 million market cap with 340 million SCRT in circulation. This reflects a specialized market: privacy-focused DeFi, healthcare data processing, financial confidentiality, and confidential AI agents. The ecosystem is small, but it's built for legitimate use cases where privacy isn't optional.

History and Founding

Can Kisagun and Guy Zyskind started Enigma in 2017 with a different goal than most crypto projects. They weren't trying to build another token. They published peer-reviewed research on secure computation, co-authoring papers on cryptographic protocols and off-chain privacy. This academic foundation separated Enigma from hype-heavy privacy projects. The team actually understood the math.

The initial concept was clever: Ethereum executes publicly, so Enigma proposed off-chain encrypted computation coordinated through smart contracts. But coordinating privacy off-chain was complicated. They eventually realized they needed their own blockchain with privacy built into the core protocol.

February 2020: Mainnet and proof-of-concept

Enigma's mainnet launched February 13, 2020, as the first blockchain running smart contracts inside Intel SGX enclaves. The network processed encrypted inputs and produced encrypted outputs. It worked. Developers could build Secret Contracts—Rust code compiled to WebAssembly that executed in encrypted processor regions.

The platform had an identity problem. "Enigma" sounded like a mystery novel. In May 2020, they rebranded to Secret Network. The name better reflected what they were building: a network that treats privacy as infrastructure, not a gimmick.

September 2020: Hard fork to Secret-2

A critical network upgrade (September 15, 2020) moved from "secret-1" to "secret-2" and fundamentally improved what developers could build. The first version was experimental and limited. Secret-2 enabled production-grade DeFi: Shade Protocol could issue stablecoins backed by collateral, SecretSwap could operate an AMM without exposing trade amounts, and third-party teams could deploy sophisticated applications.

This wasn't just a feature add. It was the moment Secret Network stopped being a research project and became a real platform.

2021-2022: Cross-chain bridges and ecosystem growth

Secret Network built bridges to Ethereum and integrated with Cosmos IBC, letting users move assets on and off the network while maintaining privacy. Shade Protocol, Sienna Network, and others created financial products: privacy-preserving lending, stablecoins, yield farming. The ecosystem was small but functional.

2023-2026: Secret 2.0 and confidential AI

Beginning in 2023, the roadmap shifted toward "Secret 2.0"—expanding beyond DeFi into broader privacy infrastructure. The goals:

  • Support more types of Trusted Execution Environments (AMD SEV, ARM TrustZone) so validators aren't locked into Intel hardware
  • Confidential VMs for arbitrary encrypted computation beyond smart contracts
  • Confidential AI agents processing sensitive data without revealing the underlying information
  • Cross-chain privacy services for other blockchains

In July 2025, Cintara AI integrated with Secret Network, enabling confidential AI agents to run on encrypted data. This wasn't a funded crypto venture looking for an excuse to use "AI" in a press release. It was a legitimate technical integration where AI inference could happen on healthcare data, financial records, or personal information without the data ever being exposed.

Technical architecture

Consensus: Tendermint Proof-of-Stake

Secret Network uses Tendermint BFT consensus, the same mechanism Cosmos and other networks use. Validators collateralize SCRT tokens and participate in block production. If they misbehave or disappear, they lose stake. Byzantine Fault Tolerance means the network tolerates up to 33% malicious validators without breaking.

Blocks arrive every 6 seconds. Finality is explicit: once a block is committed, it cannot revert. Bitcoin requires 10+ blocks to feel safe; Tendermint achieves irreversibility in 2 blocks (~12 seconds).

Trusted Execution Environments and encrypted computation

This is the core innovation. Trusted Execution Environments (TEEs) are isolated processor regions—enclaves—where code runs without OS or hypervisor observation. Intel SGX is the primary implementation. When you create an SGX enclave:

  • Code executes inside the CPU; the OS can't see the execution
  • Memory is encrypted with keys the enclave holds; external processes can't decrypt it
  • Remote attestation allows third parties to cryptographically verify the enclave is genuine (not a fake claiming to be an enclave)

Secret Contracts execute in these enclaves. Transactions arrive encrypted. The enclave decrypts them, processes the computation, and encrypts the output before it goes on-chain. The contract's persistent state (its database) is also encrypted at rest; only the enclave can decrypt it.

Why does this matter? On traditional blockchains, you can see everything: which wallet sent funds, where they went, what they paid for. On Secret Network, an observer sees only encrypted blobs. The computation happens inside the enclave; the blockchain records the cryptographic proof that it happened correctly.

Smart contracts in Rust + WebAssembly

Developers write Secret Contracts in Rust. Rust forces memory safety—no buffer overflows, no dangling pointers. The code compiles to WebAssembly, which runs efficiently across different processor types.

The Secret Contracts SDK provides privacy-aware APIs: methods to read and write encrypted state, derive random numbers that are cryptographically verifiable, and communicate between contracts. Developers explicitly think about encryption; they're not writing contracts that happen to run on a privacy network—they're designing systems with privacy as a first-class concern.

Validator key management and distributed encryption

Each validator operates encryption keys. The network uses threshold encryption: you need >2/3 of validators to cooperate to encrypt or decrypt transaction contents. A single validator—even the most powerful one—cannot decrypt anything alone. This means compromising <33% of validators doesn't compromise the network.

Ecosystem and adoption

SecretSwap

SecretSwap is the native AMM. You trade assets without the blockchain recording your identity, the amounts you swapped, or which assets you touched. It's not revolutionary technology—it's straightforward DeFi—but it runs with all inputs encrypted.

SecretSwap V2 (late 2024) added multi-hop routing for better price discovery and governance participation for RON holders.

Shade Protocol

Shade Protocol issues sUSD, a stablecoin that maintains price stability while keeping your holdings private. Unlike USDT (which records every holder), sUSD transactions are encrypted. The collateral backing sUSD is transparent on-chain (the network can verify the protocol is solvent), but your personal holdings remain encrypted.

Confidential AI agents (July 2025)

The July 2025 integration with Cintara AI was the most significant ecosystem expansion. AI agents can now process encrypted data: health records, financial information, personal details. The agents return insights without ever exposing the raw data.

This has real use cases. Insurance companies could analyze claims data. Healthcare systems could identify disease patterns. Financial advisors could model portfolios. None of these require exposing underlying information.

Exchanges, wallets, and infrastructure

Despite lower market cap, SCRT trades on major exchanges: Kraken, KuCoin, Binance, Gate.io. Keplr is the standard wallet for Cosmos-based assets and integrates Secret Contract interaction directly. Ledger hardware wallets support SCRT for offline key management. MetaMask can access wrapped SCRT via the Ethereum bridge.

Tokenomics and governance

SCRT has no hard maximum supply. Annual inflation is 9% (April 2026), with a governance proposal aiming to reduce it to 6% over four years, introduce $1,000/year validator minimums, and allocate community funds toward liquidity provision.

Circulating supply: 340 million SCRT

Annual inflation: 9% (subject to governance reduction)

Token holders stake to validators and earn staking rewards. Current yields range from 15-25% annually, depending on validator commission and network parameters. Staking also gives voting power on governance proposals.

Governance and development

Community governance operates on-chain: SCRT holders vote on protocol changes, funding, and ecosystem direction. Voting power scales with stake amount. This contrasts with many Layer 1s where founders or core teams control decisions unilaterally.

The Secret Network Foundation has $400 million in announced ecosystem funding supporting developer grants, protocol research, and ecosystem initiatives. This is institutional-scale capital, enabling professional-grade development alongside community governance.

Secret 2.0 roadmap (2026 focus)

The development focus centers on:

  • Layer 1 strengthening: security, scalability, decentralization
  • Confidential AI/VM ecosystem: expanding privacy infrastructure beyond finance
  • Customer acquisition for SecretAI and SecretVM offerings
  • Cross-chain privacy services positioning Secret as privacy infrastructure for other blockchains

Regulatory status

Secret Network faces regulatory scrutiny similar to Monero and Zcash, but with a differentiation: it's not inherently a privacy coin. It's a smart contract platform where privacy is optional infrastructure. This enables legitimate applications (healthcare, finance, confidential computation) that go far beyond anonymity for cryptocurrency trading.

Regulatory clarity on privacy-preserving smart contracts remains absent. SEC and FinCEN haven't issued guidance on whether confidential AI agents are securities or whether they require licensing. EU MiCA could restrict privacy coin services, though its application to privacy-preserving computation platforms is unclear.

Controversies and risk factors

Intel SGX vulnerabilities

Intel SGX has experienced numerous security vulnerabilities over its lifetime: Spectre, Meltdown variants, Foreshadow. Each disclosure creates temporary unease. The SGX threat model isn't fixed; it evolves with each new vulnerability class.

Recent vulnerability disclosures (2024-2025) show SGX isolation guarantees remain subject to architectural limitations. Secret Network's security depends on validator operators patching promptly. An unpatched validator running vulnerable SGX could be compromised.

Validator hardware centralization

All Secret Network validators require Intel SGX-capable hardware. This creates centralization risk. Enterprise-grade processors with SGX are expensive; small validators struggle acquiring compatible hardware competitively.

The roadmap mentions expanding to AMD SEV and ARM TrustZone, but timelines are uncertain. Until then, the network depends on a single vendor's hardware security implementation.

Limited ecosystem adoption

Relative to Ethereum or Solana, Secret Network has minimal developer adoption and a small user base. The privacy focus narrows the addressable market. You don't build on Secret Network unless privacy is core to your application.

Throughput constraints

0.8 TPS is slow. Confidential computation adds overhead; the network can't match high-throughput platforms. If you need privacy and scale, Secret Network won't be your first choice.

Recent developments (2025-2026)

Confidential AI integration (July 2025)

Cintara AI integration enabled confidential AI agents operating on encrypted data. This expanded Secret Network's utility beyond financial applications into AI privacy infrastructure—a meaningful expansion of the network's value proposition.

Inflation reduction proposal (2026)

Community proposals for 2026 aim to reduce annual inflation, introduce validator minimum stipends, and allocate community pool funds toward liquidity. These reflect community commitment to sustainable economics and network security.

SecretVM development (2025-2026)

Secret 2.0 progress continued toward general-purpose confidential computation. SecretVM targets arbitrary encrypted computation, positioning the network as privacy infrastructure beyond smart contract limitations.

FAQ

Q: How does Secret Network provide privacy without transparent transaction visibility?

A: Trusted Execution Environments (TEEs)—Intel SGX hardware enclaves—encrypt smart contract execution. Inputs, outputs, and state remain encrypted; only validator enclaves decrypt contents. Threshold encryption requires >2/3 validators to cooperate, preventing individual validators from observing transaction details.

Q: What's the difference between Secret Contracts and traditional smart contracts?

A: Traditional contracts execute transparently with public state. Secret Contracts execute in encrypted enclaves with encrypted state. Developers design for privacy; it's not an afterthought layered on top.

Q: Can validators see Secret Contract execution?

A: Individual validators decrypt and execute contracts in their enclaves, so they observe execution momentarily. But network design requires >2/3 validator consensus for finality; compromising <33% of validators cannot control outcomes. Encryption/decryption keys derive from distributed consensus, preventing individual validators from key derivation.

Q: What if Intel SGX vulnerabilities enable enclave escape?

A: Enclave compromises would potentially break Secret Network security. But exploitation requires validator-level privileges (kernel/hypervisor access), which constitutes validator operator attacks rather than network attacks. Economic structure disincentivizes validator operators from attacking the network they've collateralized.

Q: Is Secret Network scaling to broader adoption?

A: Throughput (~0.8 TPS as of 2026) remains constrained relative to modern scaling solutions. Secret 2.0 development prioritizes scaling through enhanced cryptographic protocols and additional TEE provider support, but substantial throughput expansion remains challenging given confidential computation overhead.

Q: How does Confidential AI change Secret Network's value proposition?

A: Confidential AI agents enable privacy-preserving machine learning—substantial expansion beyond financial applications. This positions Secret Network as privacy infrastructure for sensitive AI computation: healthcare data analysis, financial modeling, personal intelligence agents.

Q: Can Secret Network support non-financial privacy applications?

A: Yes. Secret Contracts enable arbitrary encrypted computation including identity/credential systems, confidential voting, supply chain privacy, and healthcare data management. Financial applications are one category of privacy-preserving smart contracts; many others exist.

Q: What prevents regulatory authorities from forcing hard forks?

A: The decentralized validator network prevents centralized shutdown or modification. Regulatory authorities could restrict validator operation (ISP blocks, hardware access controls, legal threats), effectively disabling the network through operator coercion rather than protocol modification.

Author: Crypto BotUpdated: 12/Apr/2026