ICP Finally Solves The Blockchain Privacy Paradox

vetKeys let ICP apps keep data private on a public chain by generating user-specific keys that no single node can read.
nternet Computer logo is screened on a mobile phone for illustration photo. Krakow, Poland on April 9th, 2024 (Photo by Beata Zawrzel/NurPhoto via Getty Images)
nternet Computer logo is screened on a mobile phone for illustration photo. Krakow, Poland on April 9th, 2024 (Photo by Beata Zawrzel/NurPhoto via Getty Images)
Profile Image
Jonathan Morgan·Stocktwits
Published Jul 03, 2025 | 10:36 AM GMT-04
Share this article

Blockchains were born open, but most real-world apps need some data to stay closed. That tension has sidelined countless projects - until now. 

With the Niobium upgrade, the Internet Computer (ICP) introduced vetKeys, a feature that manufactures user-specific secret keys inside the protocol itself. Keys are generated by all nodes in a subnet, immediately sharded, and shipped to the rightful owner in an encrypted bundle. 

No node, hacker, or rogue admin ever sees the full private key; only the user can reconstruct it locally.

Why is that such a big deal? Because the moment you can encrypt data without introducing a centralized key server, entire classes of GDPR-sensitive or enterprise workloads become block-chain-viable. 

Picture a medical-records dApp where doctors decrypt files on-demand, or a payroll system that stores salary figures on-chain yet keeps them invisible to everyone except HR and the employee. 

The vetKeys flow is pure cryptography: the user supplies a one-off “transport” public key; each validator derives an encrypted key share; the canister bundles those shares; and the user decrypts the final secret on their own device, verifying the package wasn’t tampered with along the way.

Developer possibilities explode:
 

  • Private Data Vaults – On-chain password managers, diaries, or KYC files that remain recoverable across devices because the user can always re-derive the same vetKey tied to their identity.
  • Encrypted Messaging – End-to-end chats where a username doubles as a public key. No manual exchange, no centralized key server, and lost phones are no longer catastrophic.
  • Time-Locked Auctions & Dead-Man Switches – Bids or whistle-blower documents stay sealed until a smart-contract timer elapses, then unlock automatically for audit.
  • MEV-Proof DeFi – Trade details are encrypted until the transaction finalizes, starving front-running bots of intel.
  • Cross-Chain Credentials – Canisters sign BLS, ECDSA, Schnorr, or EdDSA payloads, turning themselves into decentralized oracles for other networks.


Projects are already integrating the toolkit. OpenChat will let users regenerate lost encryption keys; Diode is building fully private storage canisters where even node operators can’t peek. 

Looking ahead, Trusted Execution Environments will allow data to be decrypted inside secure enclaves, enabling complex computations without ever exposing raw information. 

vetKeys don’t merely bolt privacy onto ICP - they make confidentiality a native, first-class feature of the chain. If you shelved a Web3 idea because “everything is public,” it may be time to dust off that roadmap.

Also See: Quant Says Middleware Will Rule the Stack

For updates and corrections, email newsroom[at]stocktwits[dot]com.

Subscribe to Cryptotwits
All Newsletters
Get the daily crypto email you’ll actually love to read. It's value-packed, data-driven, and seasoned with wit.
Read about our editorial guidelines and ethics policy