Sapphire is the first and only confidential EVM that empowers Web3 with Smart Privacy — privacy that evolves with developers, users, and brands. Developers can build EVM-based on-chain dApps with smart contracts that are 100% confidential, 100% public, or anywhere in between.

Get started building confidential dApps on Sapphire!

Watch this demo video.

How to Use Sapphire Testnet

How to Use Sapphire Testnet


Key Features

Private Storage

Sapphire offers end-to-end encryption and encrypted storage for executing contracts that include secret data. Sapphire also simplifies the technical workflow for building dApps that generate random numbers, sign or verify cryptographic signatures, and more.

EVM Compatibility

Applications built on any EVM network can be ported over to Sapphire without making any major changes if the developers build with tools like Truffle or Hardhat. All dApps also remain compatible with MetaMask and other window.ethereum providers.

Encryption Precompiles

Precompiled contracts for random number generation, keypair generation, signing and verification, and more encrypted processes are available for all developers running dApps on Sapphire.

Free View Calls

There is no cost to use `eth_call`, and on Sapphire the contract has full access to its private state. Taking advantage of this gives your dApps the ability to do things that can't be done on transparent EVM chainsand it won't cost a penny for your users.

Web2 Authentication

Web3 dApps that include Web2 authentication features belong on Sapphire. With support for EcDSA, EdDSA, and confidential storage, applications built on Sapphire can add authentication using strong credentials that are present in every modern mobile device and browser.

Explore More

Read the docs

Building Better dApps Starts with Sapphire

Building on Oasis positions any dApp to achieve the most important features and use cases for every Web3 audience.

Integrate & Deploy in minutes!

Get ready to experience the fast and frictionless development experience of building on Sapphire.

Use Cases

Be Compliant and Keep Information Safe

Keep sensitive information hidden from bad actors, spammers and phishers by encrypting it so only those who need to know can see it. Programmable privacy allows contracts to selectively reveal only what is required and necessary to abide by regulations in a way which is auditable and safe from abuse or dragnet surveillance. The range of cheap cryptographic primitives available on Sapphire EVM allows you to develop contracts which are end-to-end encrypted, compliant and safe.

TOTP 2-factor authentication

Transparent EVM chains can’t use TOTP because it requires the contract to know the secret seed which generates the familiar 6 digit code on your phone that many companies require as a second factor authenticator. TOTP is widely used when logging into websites (in combination with rate-limiting so you can’t try all 1 million combinations every 30 seconds) and is the most popular 2FA method of enterprises & corporations across the globe to secure access to services.

TouchID & PassKeys

Every recent Android and iPhone, and most web browsers, support WebAuthN / Passkeys. Sapphire fully supports the Ed25519 and EdDSA standards for signing and verification used by WebAuthN, meaning almost everybody on the planet can log-in and authorize actions in your application with a device-secured identity without the need for MetaMask, Web3 technologies, or costly intermediating third-parties.

End-to-End Encryption

Sapphire contracts with private storage can have their own secrets, and by using the Encryption, Decryption and Key Derivation operations for Solidity you can be assured that information passing through third-parties remains secure and tamper-free. Many valuable Web3 ideas can be radically simplified by making the trustless contract generate an encrypted token containing information that only it can see.

Keep Customer Information Safe

Transparent smart-contract blockchains such as Ethereum have been widely proposed as the enabler for next-generation industries, however they lack the privacy necessary for sensitive data and financial transactions to be used in-practice. The power of network effects and the limitation that only a select few can integrate with an ecosystem has often hindered widespread adoption of closed-source and ‘enterprise API’ systems. Oasis Sapphire and OPL brings confidential data with selective privacy to smart contracts to bridge the gap connecting the real-world with Web3 and Industry4.0.

Full-Spectrum Data Privacy

Smart privacy technology will define the future of Web3. Transparency-first smart contract development must be balanced with adequate privacy protections for safeguarding sensitive on-chain data and financial transactions. Oasis is leading the industry toward smart privacy with an ecosystem that is unhindered by dangerously public systems. Oasis Sapphire and OPL bring confidential data with selective privacy features to smart contracts, bridging the gap between the mainstream and Web3.

Dive into the code behind Sapphire

Explore the public Github repository and start adding it to your projects.

Github Repo


Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Nick Hynes

Software Developer

Sapphire FAQ’s

Are transactions encrypted?

When a dApp uses the Sapphire provider wrapper all transactions are end-to-end encrypted between the browser and the smart contract without any additional changes. However, signing encrypted transactions will look slightly different than normal in MetaMask due to EIP-712.

What is a TEE?

When the EVM is run inside a Trusted Execution Environment (TEE) - in the case of Oasis Sapphire this is Intel SGX hardware isolation - the node operators cannot see transaction inputs, return values or smart contract state because all memory used by the enclave is encrypted. The EVM runs at nearly full speed in comparison to other privacy solutions such as ZK or FHE which are very computationally expensive.

What consensus algorithm does Sapphire use?

The Sapphire ParaTime uses the Oasis Layer-1 BFT Proof-of-Stake consensus system, see the WhitePaper.

Is it compatible with Ethereum?

Yes, most applications can be ported over with no changes if they use Truffle or Hardhat. To take advantage of the full potential of confidential contracts dApps will need some minor changes.

Is it compatible with MetaMask?

Yes, dApps will remain compatible with MetaMask and other window.ethereum providers with or without the Sapphire encryption wrapper.

Do I need a bridge?

While OPL provides a bridge to many EVM chains via Celer IM, contracts on Sapphire can generate Ethereum and Bitcoin compatible keypairs, allowing them to conditionally sign their own transactions.

Can Sapphire do Web2.0 Authentication?

Yes, with support for EcDSA, EdDSA and confidential storage you can implement authentication using strong credentials present on every modern mobile device and browser.

Does it work with Hardhat and Truffle?

Developing dApps for Oasis Sapphire has full support the two most popular smart contract development frameworks. Truffle works out of the box using the Sapphire wrapper.

For Hardhat there is an extra plugin you can use, just add this to the beginning of your hardhat.config.ts file:
import '@oasisprotocol/sapphire-hardhat';

How is Sapphire different from Oasis Privacy Layer?

Oasis Privacy Layer (OPL) is a message passing bridge and suite of utilities that enables you to easily access the confidentiality and encryption features of Sapphire from many other EVM compatible chains without your dApp users worrying about how to pay gas.

Read More

Have an existing dApp on EVM?

Add instant privacy with Oasis Privacy Layer.

Learn more

Get Involved

How we use cookies?

At Oasis Foundation we believe in your privacy, so you can choose to browse our site without any tracking or by clicking “Accept”, you help us to improve our site and help us grow our ecosystem. View our Privacy Policy for more information.