We make your blockchain stack private
Introducing Bubble: End-to-end protection for your business and customer data across any L1s, L2s, and cross-chain operations — built on secure MPC.
Onchain privacy is finally possible.
Integrate Bubble to your stack. Get the best of all worlds.
Soda Bubble
All-in-One
Confidential Stack
- Battle-tested AES encryption
- Post-quantum security with AES-256
- Data leak prevention even if a node is compromised, using MPC
Soda Bubble All-in-One Confidential Stack
- Battle-tested AES encryption
- Post-quantum security with AES-256
- Data leak prevention even if a node is compromised, using MPC
Your business is exposed
Your on-chain interactions are easily tracked by competitors, business counterparties, MEV actors, phishing attackers, and other malicious entities.
World-leading institutions are rapidly adding privacy to their stack. Don't stay behind.
Without Privacy
Risks Without Privacy
Frontrunning & MEV extraction
Large pending transactions can be detected in advance. High-frequency traders and MEV bots can step in first, extracting value and worsening execution.
Strategy leakage
By analyzing on-chain flows over time, competitors can reverse-engineer proprietary trading strategies, treasury behavior, or business relationships.
Regulatory & compliance breaches
Regulations such as GDPR, MiFID II, and data-protection frameworks increasingly require strict confidentiality. Public broadcast of transactional data can directly conflict with these obligations.
With Bubble Privacy
Protected with Bubble
MEV & frontrunning protection
Bubble encrypts transaction data before it hits the mempool. Your transactions remain invisible to bots and extractors until execution is complete.
Complete confidentiality
Proprietary strategies, treasury operations, and business relationships stay private. Competitors cannot analyze or reverse-engineer your on-chain activity.
Built-in compliance
Meet GDPR, MiFID II, and data protection requirements out of the box. Bubble ensures transactional confidentiality while maintaining full blockchain benefits.
Same infra. All apps. Everywhere.
DeFi & MEV Protection
Private execution for swaps, lending, liquidity management, and strategies without exposing positions or intent.
Payments & Payroll
Private stablecoin transfers with selective disclosure and compliance.
Banking
Non-custodial on-chain accounts with private balances and activity.
Tokenization
Confidential launches and price discovery, vesting, distribution, and governance.
RWA Tokenization
Confidential issuance, distribution, and management.
Fair Markets & Auctions
Sealed-bid auctions and private market mechanisms preventing front-running.
Built for production. Proven at scale.
MPC-based privacy that enterprises trust. Battle-tested encryption meets blockchain performance.
Programmable privacy that never touches plaintext
Soda Labs is built on a garbled-circuit–based Multi-Party Computation (MPC) architecture. This allows arbitrary computation to be performed directly on encrypted data — without ever decrypting it at any point in the system.
Sensitive on-chain data such as balances, transaction amounts, trades, fund shareholders' accrued profits and shares, onchain banks, or any other business logic inputs are split and distributed across multiple independent nodes. No single node can access meaningful information, and even if a node is compromised, no data is leaked.
The result is a system where privacy is preserved by design, not by trust — while remaining fully compatible with public blockchains and smart contracts.
No plaintext
Data never decrypted
No trusted operator
Fully decentralized
No data exposure
Even if nodes compromised
How Soda Bubble compares to other privacy approaches
Soda Bubble GC-MPC delivers the best combination of security and usability. See comparison to different technologies below.
A practical comparison of garbled-circuit MPC used by Soda Bubble network versus FHE used in Zama network.
| Capability | Soda Bubble (GC-MPC) | FHE (Zama and others) |
|---|---|---|
| Encrypted amounts (arguments) | Yes | Yes |
| Encrypted addresses (anonymity support) | Yes | No |
| Full EVM/SVM compatibility | Yes | No (doesn't support 256-bit and hash operations) |
| Encryption type | Battle-tested AES | TFHE |
| Encryption adoption | Worldwide internet, banks, military | Nowhere |
| Latency | Near zero – HTTPS equivalent | High latency – requires expensive client-side ZK proofs |
| Throughput | up to 30,000 tps | 2-3 tps (CPU), up to 20 tps (GPU) |
| Cost per transfer | Cheap | Expensive |
| Performant on CPU | Yes | No, relies on GPU or ASIC |
Spotlight articles
Loading articles...
Deployed. Trusted. Proven.
Real-world deployments delivering privacy at scale for institutions and networks worldwide.
Powering COTI mainnet privacy
Soda's GC-MPC is the first to deliver cryptographic onchain privacy solution, operational on the COTI network with 100% uptime (except upgrades).
Soda is selected to the ECB Pioneer
Soda will partner with the European CBDC to provide a solution for private transactions.
Soda completed a pilot with Chainlink Labs
Soda partnered with Chainlink Labs to provide a secure and private channel between institutions, to provide a privacy-preserving bridge policy enforcement (e.g., rate limits).
Soda completed a security audit with Hacken
Soda and Hacken partnered to deliver a full security audit to the Soda GC-MPC solution.
Powering COTI mainnet privacy
Soda's GC-MPC is the first to deliver cryptographic onchain privacy solution, operational on the COTI network with 100% uptime (except upgrades).
Soda is selected to the ECB Pioneer
Soda will partner with the European CBDC to provide a solution for private transactions.
Soda completed a pilot with Chainlink Labs
Soda partnered with Chainlink Labs to provide a secure and private channel between institutions, to provide a privacy-preserving bridge policy enforcement (e.g., rate limits).
Soda completed a security audit with Hacken
Soda and Hacken partnered to deliver a full security audit to the Soda GC-MPC solution.