Skip to main content

What is TEN Protocol?

TEN is a next-generation Ethereum Layer 2 rollup protocol that introduces data confidentiality, computational privacy, and resistance to Maximal Extractable Value (MEV) by leveraging hardware-based Trusted Execution Environments (TEEs). TEN represents a major step forward in decentralized system design by reintroducing data access controls — a foundational feature of Web2 that Web3 largely abandoned in favor of radical transparency.

The Web3 Privacy Problem

Public blockchains have validated the promise of programmable value, but exposed a critical flaw: the complete absence of data access control. Transparency, once celebrated as a virtue, has become a liability. On-chain activity today remains fully public — every balance, transaction, strategy, and piece of logic is visible to everyone, including competitors, adversaries, and MEV bots.

If you analyze any successful digital application — Netflix, WhatsApp, Spotify, banking apps, even mobile games — they all rely on access control. Not just for privacy, but to function. Smart contracts today can define who can write data, but they cannot restrict who can read it. This fundamental limitation makes it nearly impossible to build viable real-world applications in Web3 beyond speculation.

TEN's Solution: Smart Transparency

TEN introduces Smart Transparency — a paradigm where smart contracts not only enforce rules of computation, but also enforce rules of data access. By integrating programmable encryption, TEEs, and an Ethereum-compatible execution environment, TEN enables encrypted, autonomous, and composable smart contracts that preserve privacy without sacrificing decentralization or composability.

Core Architecture

Encrypted Execution: All transactions and internal state of application contracts remain encrypted and hidden, providing a credible solution to MEV while maintaining EVM compatibility for easy migration of existing contracts.

Trustless Design: TEN leverages TEEs for privacy but not for integrity. If a TEE is compromised or a manufacturer behaves maliciously, the system gracefully degrades into a transparent blockchain, preserving ledger integrity while forfeiting privacy.

Ethereum Layer 1: TEN uses Ethereum as a base layer for security and data availability while enabling lower transaction costs similar to other Layer 2 networks, with quick finality synchronized to L1 block cadence.

Key Differentiators from Transparent Chains

FeatureTransparent ChainsTEN Protocol
Data AccessAll data publicProgrammable access control
MEV ProtectionLimited solutionsBuilt-in confidentiality
Smart Contract StateFully visibleEncrypted with selective disclosure
Transaction PrivacyPublic by defaultPrivate by default
ComplianceDifficultTime-delayed revelation for deterrence
Account-based smart contract executionAccount model with public state and callsAccount model, EVM-compatible, encrypted state and calls
DecentralisedDecentralised consensusSequencer and decentralised validators

Addressing Key Challenges

Hardware Trust: TEN's trust model doesn't require perpetual belief in any single hardware vendor. The protocol uses Ethereum's security combined with game theory to detect and correct eventual TEE compromises.

Usability: The system implements flexible policies for delayed transaction revelation, balancing privacy needs with regulatory compliance and illegal activity deterrence.

MEV Prevention: Beyond hiding transactions, TEN introduces delays at critical moments to prevent aggregators from performing replay-attacks and exploiting side-channels.

Unlocking New Applications

TEN's confidential rollup architecture enables previously impossible on-chain applications:

  • Confidential DeFi: Dark pools, private lending, MEV-resistant trading
  • Private Gaming: Poker, strategy games with hidden information
  • Autonomous AI Agents: Protected algorithms and private coordination
  • Enterprise Solutions: Confidential auctions, private supply chains
  • TEE-Stablecoins: Reserve-backed with provable but confidential attestation