On what "rational privacy" requires you to disclose.


Privacy inverted

In 1993, Eric Hughes published A Cypherpunk’s Manifesto. One sentence in particular became the conceptual foundation for everything that followed in privacy-preserving technology:

"Privacy is the power to selectively reveal oneself to the world."

The definition was precise and its implications were radical. Privacy was not secrecy, which Hughes distinguished as "the power to prevent others from knowing." Privacy was agency: the individual’s capacity to choose what to disclose, to whom, and under what conditions. The power sat with the person. The architecture served the person. The institution had no privileged position. If privacy was a door, the individual held the only key.

Thirty years later, Midnight Network describes its core innovation in strikingly similar terms. The homepage promises "sovereign control" where "you decide what remains private." The Compact smart contract language provides disclose(), a first-class primitive for selective revelation. The documentation speaks of "proof without exposure," "freedom of association," and "the architecture of freedom."

The vocabulary is Hughes'. The architecture is not. In Midnight’s design, the developer defines what is visible and what is concealed, within a framework that preserves institutional access through viewing keys: cryptographic instruments that grant read-only surveillance to designated parties, typically regulators, auditors, or compliance officers. The disclose() primitive does not give the user the power to selectively reveal. It gives the developer the power to define the conditions under which institutional revelation is automated. The door has two keys. The user was told about one of them.

This is not a technical complaint. It is a structural observation about what happens when the language of resistance is adopted by the interests it was designed to resist. The cypherpunks built privacy tools to protect individuals from institutions. Midnight builds privacy tools to make institutional access to individual data frictionless, auditable, and protocol-native. The surface reads the same. The power flows in the opposite direction.


Provenance

Midnight describes itself as "a fourth-generation blockchain built for rational privacy." The generational claim implies advance beyond predecessors, a synthesis of lessons earlier architectures failed to absorb. The source code describes something more specific: a careful assembly of well-established components, integrated with competence and positioned with ambition.

The chain runs on the Polkadot SDK (Substrate). Its execution environment, state machine framework, and networking stack derive from Parity Technologies' substrate crate, not from Cardano’s Haskell infrastructure. Block production uses AURA (Authority Round), a proof-of-authority round-robin scheme first implemented in OpenEthereum. Finality is provided by GRANDPA, the Web3 Foundation’s finality gadget for Polkadot. Midnight’s own consensus documentation is unambiguous: "The Midnight network leverages a modified consensus model built on top of standard Substrate primitives, specifically AURA for block production and GRANDPA for finality." Neither is Ouroboros. The relationship to Cardano is organizational and economic. It is not architectural.

The zero-knowledge proving system draws from a longer lineage. Midnight uses PLONK with KZG polynomial commitments on BLS12-381 curves, built on a modified fork of Halo2 that originated with the Zcash team and was maintained by Privacy Scaling Explorations (PSE). The midnight-zk repository is forthright about the provenance:

"This project was originally built upon the foundations of several outstanding open-source libraries: blstrs (Filecoin Project), jubjub (Zcash Project), halo2curves v0.8.0 (PSE team), halo2 v0.3.0 (PSE team, derived from Zcash Sapling)."

The README adds that these components "have evolved into standalone implementations tailored to Midnight’s needs." The attribution is honest. The divergence is real. What the acknowledgment also reveals is that the cryptographic infrastructure underneath Midnight is not a novel construction. It is a competent adaptation of tools the Zcash, Ethereum, and Filecoin ecosystems built first. A mid-development migration from Pluto-Eris curves to BLS12-381 in April 2025 yielded 50% faster verification and 17% smaller transactions, a pragmatic decision to leverage an existing, widely vetted trusted setup. BLS12-381 is the same curve family used by Zcash and Ethereum’s consensus layer. The choice consolidates Midnight onto shared infrastructure rather than establishing independent cryptographic ground.

The theoretical scaffold is the Kachina protocol, published by Thomas Kerber, Aggelos Kiayias, and Markulf Kohlweiss in ePrint 2020/543 and presented at IEEE CSF 2021. Kachina formalizes private smart contracts in the Universal Composition (UC) model, providing a general protocol that subsumes prior application-specific constructions. Kiayias co-authored Ouroboros and serves as Chief Scientist at IOG. The intellectual pipeline from IOG research to Midnight product is direct and traceable. It is also, in this instance, legitimate: Kachina is a genuine contribution to the formal foundations of private computation.

What is original to Midnight is the integration: the Compact language, the three-part contract model, the dual-token economic design, and the Zswap extension of Zerocash for multi-asset shielded swaps. The use of proven open-source cryptography is good practice. Describing the assembly as "fourth-generation" innovation is a choice about positioning that the code does not require and the provenance does not support.


Under the hood

The contract model reflects the central challenge of privacy-preserving computation: proving correctness without exposing content. Midnight’s answer partitions every contract into three cooperating layers, each operating under different trust assumptions.

The public transcript is bytecode executing on-chain through Midnight’s custom virtual machine, Impact. Its shape is constrained by the accompanying zero-knowledge circuit, which means the on-chain layer is not a general-purpose execution environment but a verification surface. It can only do what the proof system has validated.

The ZK circuit is the mathematical core, compiled from Compact into algebraic constraints. When a user invokes a contract, their local machine generates a proof that these constraints are satisfied. The network verifies the proof without accessing the private inputs that produced it. Privacy lives here, in the mathematical gap between what the proof attests and what the prover knows.

The off-chain witness is TypeScript code running locally, supplying private inputs to the circuit. Witness functions may perform arbitrary computation, query databases, call APIs, prompt the user, but their outputs must satisfy the circuit’s constraints. The witness never leaves the local machine.

Compact

Compact is TypeScript-adjacent in syntax but operates under constraints foreign to TypeScript developers. All loops require fixed iteration counts determined at compile time. Variables are immutable. There is no recursion, no dynamic dispatch, no closures over mutable state. Strings and byte arrays are opaque hashes inside circuits, meaningfully manipulable only in witness functions. Cross-contract calls remain "reserved but not yet fully implemented". These are consequences of compiling to zero-knowledge circuits, not oversights. The question is not whether these constraints exist, every ZK language faces them, but how each language negotiates the boundary between expressiveness and provability.

The competitive landscape reveals divergent philosophies. Noir (Aztec) compiles to a backend-agnostic intermediate representation, offering portability across proving systems. Leo (Aleo) integrates formal verification and ships with a mature ZK virtual machine. o1js (Mina) uses TypeScript natively, eliminating the DSL boundary entirely. Compact’s advantage is accessibility for the web development community. Its cost is lock-in: programs target Midnight’s specific toolchain, proving system, and ledger model. Portability is not a design goal. For developers who value the freedom to migrate, this is an important asymmetry.

One architectural detail warrants isolated scrutiny. The Compact compiler (compactc) is distributed as a prebuilt binary. The ZK circuits, elliptic curve implementations, and node software are published as open source, but the tool that transforms developer-written Compact into the zero-knowledge constraints those circuits enforce is not available for independent source review. For any privacy system, the compiler occupies a uniquely sensitive position. A subtle error or a deliberate modification at the compilation stage could compromise the privacy guarantees the rest of the architecture provides, and no external party could detect it through code audit. In a system whose entire value proposition rests on the claim that data is protected, the opacity of this single link in the chain is not a minor caveat.


Cardano’s shadow

Midnight is officially a Cardano "Partner Chain." The classification is precise. A sidechain inherits its security model from a parent chain. A partner chain runs its own consensus but maintains structural integration points. Midnight occupies the second category, which means its security derives from its own validator set, while its operational infrastructure remains entangled with Cardano’s.

Running a Midnight validator requires a full Cardano node, a database synchronization layer, and Ogmios, Cardano’s WebSocket API. Validators must first operate as Cardano Stake Pool Operators, then register through a smart contract on the Cardano ledger. The NIGHT token was minted as a Cardano Native Asset. At genesis, Midnight mirrored Cardano-side token balances into its own state.

At launch, the bridge operates in one direction only: Cardano to Midnight. No protocol-level reverse bridge exists. The tokenomics whitepaper formalizes a cross-chain invariant, M.U + C.U ≤ S, requiring that unlocked tokens across both chains never exceed total supply. The system errs conservatively, preferring fewer tokens unlocked than the idealized total.

The entanglement has material consequences. If Cardano experiences downtime, Midnight block production continues independently. But validator registrations, which flow through Cardano smart contracts, halt. The token bridge freezes. The reserve reward mechanism pauses: "Midnight will not release reward tokens it has not seen released on Cardano." The chain survives Cardano outages. It cannot function fully without Cardano liveness.

Substrate, Not Ouroboros

What actually runs underneath a Midnight validator is Substrate: AURA for block production, GRANDPA for finality, sr25519/ed25519/ECDSA for signing. The block time is 6 seconds. None of these are Cardano-native primitives. The "Partner Chain" label describes an organizational coupling, a token issuance relationship and a validator identity bridge. It does not describe a shared execution environment or a shared security model.


Economics of opacity

NIGHT has a fixed supply of 24 billion tokens.

35%
Midnight Foundation
8.4B NIGHT — no public sub-breakdown
25%
Reserve
6.0B — block production rewards
15.25%
TGE distribution
3.66B — via exchanges
14.78%
Glacier Drop
3.547B — Phase 1 community claim
4.75%
On-Chain Treasury
1.141B
5.22%
Remaining community
Scavenger Mine + Lost-and-Found

Every line itemizes its purpose except the largest. The Midnight Foundation, a Cayman Islands entity, receives 35% of total supply: 8.4 billion NIGHT. No public sub-breakdown exists for how this allocation distributes across development, operations, team compensation, advisory arrangements, partnership incentives, or any other purpose. Nowhere in the whitepaper does a category labeled "team," "IOG," or "insider" appear. The community distribution is itemized to the decimal. The Foundation’s share is a single opaque block.

The structural reading requires no speculation. In token distributions, the entity that receives the largest undifferentiated allocation is the entity that compensates the builders. The Foundation label connotes public stewardship. The function is private capitalization. These are not contradictory, an entity can do both, but the absence of any sub-breakdown means the community cannot evaluate the balance between them.

The dual-token model introduces DUST: shielded, non-transferable, decaying. DUST is generated by holding NIGHT, burned when paying transaction fees, and cannot be bought or sold. The whitepaper claims MEV resistance through fee shielding, since attackers cannot identify victims through fee analysis. The claim addresses one extraction vector. MEV is fundamentally a transaction-ordering problem: if block producers can observe transaction content before inclusion, ordering-based extraction remains viable regardless of whether fee amounts are concealed. The architecture narrows the attack surface without eliminating the underlying dynamic.

Tokens vest over 360 days in quarterly 25% installments, with randomized start dates staggering the unlock. Whether the Foundation’s 8.4 billion tokens vest under the same schedule is a question the whitepaper does not address.


Governance as authorship

In August 2025, Charles Hoskinson addressed the relationship between Midnight, IOG, and the Cardano Foundation during a public AMA. The Currency Analytics reported:

"We built it. It’s my money. We can do whatever we want."

The sentence is more instructive than any whitepaper. Most blockchain founders navigate a rhetorical tension between personal authorship and public governance. They built the system, but the system is for everyone. They control the keys, but the keys will be distributed. The language of stewardship manages the gap between present concentration and future decentralization. Hoskinson dispenses with the management. Authorship confers ownership. Ownership confers control. The syllogism is complete.

He confirmed that the Cardano Foundation was deliberately excluded from NIGHT token claims, calling it a potential "adversarial governance bloc." He elaborated: "They’d come in and instantly be adversarial and assert that they have some sort of governance control." The Foundation that co-built the ecosystem was barred from participating in the governance of a system developed by the same principal. The criterion was not competence or contribution but alignment.

Seeing Like a Chain

James C. Scott argued in Seeing Like a State that centralized institutions impose legibility on the populations they govern. Surnames, cadastral maps, standardized weights: each makes the subject visible to the authority. The process serves administration, not the administered. Midnight’s "rational privacy" architecture performs a parallel function: it makes blockchain activity legible to regulators through viewing keys, compliance hooks, and selective disclosure. The privacy is genuine but conditional. The condition is that the state can see when it chooses to look. Scott would recognize the pattern. Privacy that requires institutional permission to exercise is not privacy in the sense the cypherpunks meant. It is managed legibility.

The organizational chain reinforces the observation. IOG developed the technology. Shielded Technologies, an IOG spinout, executes protocol development. The Midnight Foundation holds 35% of supply. Midnight TGE Ltd, a Foundation subsidiary, manages token issuance. Governance at mainnet launch is federated: a multisig committee whose members "have yet to be identified or formed." On-chain governance does not exist. The on-chain Treasury (4.75%, 1.141 billion NIGHT) is locked until decentralized governance is implemented, a milestone dated "2026+" with no binding commitment.

The genesis included 12 trusted validators and a temporary sudo key. There is no slashing. Validators who fail forfeit rewards but face no penalty for misbehavior.

The governance is not unusual for an early-stage project. What is unusual is the philosophical candor. Most founders promise decentralization while practicing concentration. Hoskinson practices concentration while describing it as earned. The honesty is, in its way, refreshing. It is also incompatible with the narrative of "sovereign control" and "freedom" that the marketing deploys.


Rational for whom

Every privacy system encodes a threat model. The architecture reveals who the system protects and from whom.

Zcash’s Orchard protocol uses Halo2 with Inner Product Arguments, requiring no trusted setup. Transactions are shielded by default. Viewing keys exist but are optional, controlled entirely by the user. There is no disclose() primitive because the architecture assumes the user has no obligation to disclose. The threat model is the institution. The design protects the individual from organizational power.

Aleo provides fully private execution by default. All computation is concealed unless the developer explicitly makes it public. The threat model is visibility itself. The design assumes that exposure is the risk and concealment is the norm.

Secret Network encrypts all contract state through hardware enclaves, making the developer model simpler at the cost of trusting Intel’s silicon. The threat model is computational: protect the data from anyone who does not hold the decryption key, including the network’s own validators.

Midnight’s design makes a different assumption. The threat model is not the institution but the institution’s inability to verify. "Rational privacy" is the answer to a specific question: how do you build a blockchain that enterprises will adopt, given that enterprises operate under regulatory obligations that require them to demonstrate compliance? The architecture provides viewing keys as protocol-native features, disclose() as a language primitive, and a selective disclosure model where the developer, not the user, defines the visibility rules.

This is a commercially viable and technically coherent answer. What it is not is the answer the cypherpunks were asking for.

Hughes wrote that "privacy is the power to selectively reveal oneself to the world." The emphasis was on oneself: the individual choosing what to share. Midnight’s architecture implements selective revelation, but the agency belongs to the developer, the application, and ultimately the regulatory framework that the application must satisfy. The user participates in the privacy, but the user does not define it. The door has two keys. The second one was installed at the factory.

The threat model determines the architecture
Zcash
The institution is the threat
Shielded by default. User controls viewing keys. No disclose().
Aleo
Visibility is the threat
All computation concealed unless developer explicitly makes it public.
Secret Network
Computational access is the threat
Contract state encrypted via hardware enclaves (SGX).
Midnight
Regulatory non-compliance is the threat
Institutional viewing keys. disclose() as language primitive. Developer defines visibility.
Marketing "The architecture of freedom is rational privacy"
Freedom of Association. Freedom of Commerce. Freedom of Expression. Language borrowed from the Universal Declaration of Human Rights.
Architecture Institutional viewing keys. Developer-defined disclosure. Compliance by design.
The disclose() primitive gives the developer, not the user, the power to define visibility rules. Viewing keys grant read-only surveillance to regulators and auditors. The architecture borrows from the compliance industry, not the cypherpunk tradition.

Privacy is the power to selectively reveal oneself to the world.

Eric Hughes, A Cypherpunk's Manifesto (1993)

Privacy is the individual's power to selectively reveal. The key sits with the person. The institution has no privileged position. Architecture serves the user. Default is concealment.

Zcash, Aleo, Secret Network: user controls viewing keys. No disclose().

Privacy is rational: selective disclosure for compliance. The developer defines visibility via disclose(). Institutional viewing keys grant read-only surveillance. Default is what the developer chooses.

The vocabulary is identical. The agency is inverted. The institution retains access by design.

Both can be true simultaneously. An architecture that protects data from the public while preserving institutional access is, by a certain definition, privacy. It is privacy as managed access. It is privacy as permission. It is not privacy as right.

Privacy as permission is not privacy as right. The distinction is not technical. It is political. And the code has already chosen.


What remains

The midnightntwrk GitHub organization hosts 29 public repositories. The ZK circuits are published. The node is open source. The midnight-js SDK has been contributed to the Linux Foundation. The Compact compiler remains binary-only, the single closed link in a chain whose value depends on every link being verifiable. Mainnet launched December 8, 2025, and operates in "Kukolu" phase: federated, functional, early. Over 170,000 addresses claimed tokens in the Glacier Drop; more than 8 million participated in the Scavenger Mine. Whether distribution translates to participation is a question the chain’s usage data, once published, will answer.

The engineering is real. The Kachina protocol is a genuine contribution to the formal foundations of private computation. The ZK integration is competent. The Zswap multi-asset shielded swap system extends Zerocash in a useful direction. The SNARK Upgradeability mechanism, which allows proving system migration without chain reset, is a practical contribution to the operational management of ZK infrastructure. These are things worth building.

The question this analysis raises is not about the quality of the engineering. It is about the inversion the engineering performs. The cypherpunk movement produced tools designed to protect individuals from institutional power. Three decades later, the most well-funded privacy blockchain in the Cardano ecosystem uses identical vocabulary, selective revelation, sovereign control, freedom, to describe an architecture that preserves institutional access as a protocol-native feature, concentrates 35% of economic power in an opaque foundation, and is governed by a committee that does not yet exist under a founder who describes the project as his property.

"Rational privacy" may be a useful product. It may satisfy enterprise requirements that no prior blockchain has addressed. It may enable real applications in healthcare compliance, financial auditing, and identity management. These outcomes are plausible.

What "rational privacy" is not, is the thing the cypherpunks were building toward. Privacy that requires institutional permission to exercise, that is architecturally designed around what the regulator needs to see, that concentrates governance in the hands of its authors and describes that concentration as earned, is not the "architecture of freedom." It is the architecture of accommodation. And accommodation, in the history of every technology that began as resistance, is how the cycle closes.