How Zekret Works

Compliance is not a frontend feature – it must be enforced at the infrastructure layer.

Institutional Node

Modular Infrastructure for Regulated Operations

Designed for institutions with legal responsibilities – exchanges, auditors, custodians, regulated fintech, and infra providers.

Each role can be run independently or combined within the same architecture.

Watchtower Role

Compliance Enforcement Infrastructure
  • Monitor transactions for AML, sanctions, and high-risk flows
  • Certify protocol integrity for institutional onboarding
  • Sign off on disclosures via cryptographic quorum
For auditors, regulators, and compliance providers. MiCA demands continuous oversight – not retroactive reporting. Watchtower Nodes make regulatory enforcement on-chain and real-time.

Gateway Role

Jurisdictional Access Control via zkID
  • Issue and verify privacy-preserving identity credentials
  • Eliminate PII storage while ensuring legal conformity
  • Enforce access policies by geography, role, and asset class
For exchanges, stablecoin issuers, wallets, and RWA platforms When assets cross borders, permissions must follow law. Gateway Nodes automate onboarding and unlock new markets.

Developer Role

Infrastructure for Regulated Deployment
  • Host zk-enabled RPC endpoints, audit APIs, and SDKs
  • Scan and certify smart contracts at deployment
  • Aggregate zero-knowledge proofs from compute layer
For infrastructure providers, smart contract auditors, backend dev teams. In regulated Web3, code isn’t ready until it’s legally compliant. Developer Nodes embed compliance into every transaction path.

Liberation Node

Decentralized Compute and Privacy Routing

Run zero-knowledge compute, encrypted message paths, and privacy-preserving services. Anyone can contribute. No onboarding required.

Operable from phones, laptops, or edge devices. Earn rewards for compute, proofs, and routing.

  • Host zk-enabled RPC endpoints, audit APIs, and SDKs
  • Scan and certify smart contracts at deployment
  • Aggregate zero-knowledge proofs from compute layer
The privacy layer. Owned by the public.