M
Manav
Guest

When you deploy a smart contract on Ethereum or Solana, everything is public: contract state, inputs, outputs, even function calls. That transparency is great for auditing, but it kills privacy and limits what developers can build.
Thatβs where Trusted Execution Environments (TEEs) come in. And more importantly, thatβs where Oasis has built an entire developer stack around them:
- Sapphire β the first confidential EVM (Ethereum-compatible, but private by default)
- ROFL β Runtime Offchain Logic, for trust-minimized offchain compute (AI, heavy logic)
- Oasis Privacy Layer (OPL) β plug-and-play privacy for any EVM chain
This post walks through why TEEs matter, and how Oasis is making them usable for developers who want to build confidential DeFi, private agents, and AI-powered dapps.
What are TEEs (and why Oasis uses them)?
A Trusted Execution Environment (TEE) is a secure enclave inside a processor (Intel SGX, AMD SEV, NVIDIA Hopper/Blackwell) that isolates sensitive computation.
Inside an enclave:
- Code and data are shielded from the outside world.
- Computations are verifiable through remote attestation.
- Results can be shared publicly without revealing private inputs.
On their own, TEEs are powerful but hard for developers to use directly. Youβd normally need low-level hardware APIs, enclave-specific SDKs, and a custom trust model.

The Oasis Confidential Stack
1. Sapphire: The Confidential EVM
- 100% EVM-compatible β deploy Solidity contracts without changes.
- State, calldata, and storage are encrypted by default.
- Keys, trading history, or sensitive business logic can live inside contracts.
- Remote attestation ensures that computation ran inside a real TEE.
Example use cases:
- Private DeFi strategies (no one frontruns your positions).
- Onchain key management (custody inside contracts).
- Encrypted NFTs or token-gated data.
2. ROFL: Runtime Offchain Logic
- Built for heavy workloads that donβt fit well onchain.
- AI inference, data indexing, and private agent logic.
- Runs inside TEEs β outputs are cryptographically verifiable.
- Connects back to chain via lightweight attestations.
Example use cases:
- AI Agents: Tradableβs SenseAI (trading strategies inside enclaves)
- DePIN: Flashback Labs (private AI training using user-owned data)
- Oracles: Offchain market feeds with verifiable trust
3. Oasis Privacy Layer (OPL)
- Middleware layer β bring Oasis privacy to any EVM chain
- Developers donβt need to migrate contracts to Sapphire to get private state
- Works via message passing + enclave execution
Example use cases:
- Private execution for Ethereum dApps.
- Plugging privacy into L2 rollups.
- Cross-chain confidential transactions.
Real Ecosystem Projects
Oasis TEEs arenβt just theory, projects are already live:
- WT3 β trustless trading agent powered by ROFL enclaves.
- Tradable β AI trading assistant with private strategy logic.
- Flashback Labs β federated AI training marketplace where users own & monetize their data.
Why Developers Should Care
As a dev, hereβs what Oasis unlocks that normal L1/L2 stacks donβt:
- Private smart contracts without learning a new VM (Sapphire is EVM).
- AI + blockchain integration without leaking sensitive data (ROFL enclaves).
- Cross-chain privacy without rewriting everything (OPL).
- Cryptographic verifiability baked in via remote attestation.
And all of this feels like working with Solidity & Web3 tooling, not some custom enclave SDK.
Getting Started
Oasis Docs β Build with Sapphire & ROFL
Try the ROFL App
Closing Thoughts
The Oasis stack is taking TEEs from βlow-level hardware featureβ to developer-ready infrastructure.
If youβre building in DeFi, agentic AI, or privacy-first apps, itβs worth experimenting with Sapphire or ROFL today. TEEs wonβt replace ZKPs or MPCβbut they give you a fast, confidential execution layer that plugs directly into the Web3 stack.
The future of privacy-by-default dapps may very well be built on enclavesβand Oasis is making that possible.
Continue reading...