Confidential Compute in an Open World: Why Privacy Is Becoming Infrastructure

[4 min read]

Public blockchains were built on radical transparency — and that design choice unlocked an entirely new digital economy. But as crypto applications mature and AI-driven systems become more autonomous, transparency alone is no longer enough. The next phase of infrastructure needs to reconcile openness with confidentiality, verifiability with scale.

That tension and how to resolve it was at the center of a conversation with Matej Janez, Head of Business Development at Oasis, during DePIN Day Buenos Aires.

Plugging Privacy into an Open Stack

Oasis positions itself not as a replacement for existing blockchains, but as an extension layer. Most decentralized applications already run on transparent ledgers, and rewriting them from scratch to support privacy simply isn’t realistic. Instead, Oasis offers confidential and verifiable compute as a modular add-on.

Developers can use Oasis to store encrypted data, manage secrets, or execute logic privately — without abandoning their existing infrastructure. The model treats privacy as a feature that can be plugged into live applications rather than a constraint that forces architectural tradeoffs.

On-Chain Trust, Off-Chain Scale

At the core of Oasis is a dual approach to computation. Sensitive data can be stored in encrypted smart contract storage on-chain, while heavy computation happens off-chain inside secure enclaves. The key difference is that this off-chain execution remains cryptographically verifiable.

Through trusted execution environments (TEEs), Oasis enables developers to prove that computation was executed correctly — even though the inputs and outputs remain confidential. This design keeps the trust guarantees of blockchains while avoiding the scalability limits of on-chain compute.

As AI workloads and data-intensive applications accelerate, that separation becomes essential. Fully transparent, on-chain computation simply cannot keep up with the demands of modern systems.

Bringing “Don’t Trust, Verify” to AI Agents

The rise of autonomous agents has exposed a new trust problem. Many so-called AI agents today operate behind centralized infrastructure, often running on cloud services controlled by a single administrator. From the outside, it’s impossible to verify how autonomous they really are, who controls them, or how they handle funds.

Oasis aims to apply crypto’s verification-first mindset to AI. With confidential compute, developers can prove how agents are managed, what logic they execute, and whether financial permissions are separated from control logic — all without exposing sensitive details.

This becomes especially relevant as AI agents begin transacting, coordinating, and interacting directly with on-chain systems.

Where Adoption Is Moving Fastest

While confidential compute has applications across many industries, Janez sees the strongest near-term traction at the intersection of AI and DeFi. These two verticals combine high economic stakes with immediate demand for privacy, integrity, and automation.

Other sectors — gaming, healthcare, broader consumer use cases — are expected to follow, but only once the underlying infrastructure becomes more standardized and widely trusted. For now, financial systems and AI-driven workflows present the clearest product-market fit.

Risk, Transparency and Open Verification

No new infrastructure layer is risk-free. Oasis acknowledges that trust can never be eliminated entirely — especially when real-world actors and off-chain systems are involved. But the goal is to minimize trust assumptions through verifiability, open-source development, and continuous public scrutiny.

In crypto, opaque systems don’t survive long. Code is audited, assumptions are challenged, and weak designs are quickly exposed. That environment, Janez argues, ultimately reduces long-term risk rather than increasing it.

Looking Ahead: Privacy as Sovereignty

Looking toward 2026, Janez expects the privacy narrative to gain momentum — driven not only by technology, but by regulation and geopolitics. As governments tighten controls over data, transactions, and digital identity, demand for self-sovereign systems is likely to grow.

Confidential, decentralized infrastructure offers a way to operate across jurisdictions, reduce centralized points of control, and give users meaningful autonomy over their data and actions.

In that sense, privacy is becoming a foundational layer for the next generation of decentralized systems.

+8,083 subscribers
To top