Veil ProtocolVEIL

Technical Whitepaper · v5 · May 2026

VEIL

Privacy as Infrastructure

Veil Core Team · veil.network

Confidential — Pre-Legal Review Draft

Download PDF

Abstract

Veil is the only quantum-resistant privacy protocol with biometric self-sovereign identity. It rebuilds the foundational layer of digital identity, communication, and value transfer using NIST-finalized post-quantum cryptographic standards — ML-KEM-768 (FIPS 203), ML-DSA-65 (FIPS 204), and SLH-DSA (FIPS 205) — deployed across every protocol layer today, not as a future roadmap commitment.

The protocol delivers a unified stack: biometric self-sovereign identity using Shamir's Secret Sharing with ML-KEM-768 wrapped shards, end-to-end encrypted communications with a quantum-resistant Double Ratchet replacing X3DH entirely, a non-custodial multi-chain wallet using ML-DSA-65 in place of ECDSA (the first quantum-resistant wallet on Base), a decentralized VPN with ML-KEM-768 pre-handshake wrap over WireGuard, a hardened browser, and an encrypted enterprise workspace — all accessible through a single biometric authentication event requiring no passwords and no seed phrases.

VEIL is a utility token deployed on Base (Ethereum L2) that powers the network economy: paying for bandwidth, staking nodes, and governing the protocol through a DAO with on-chain treasury controls. Total supply is fixed at 200,000,000 VEIL.

This document is a pre-legal review draft. Token-related sections are pending review by qualified legal counsel. Nothing in this document constitutes an offer to sell or solicitation to buy securities. VEIL tokens are utility instruments providing access to network services and governance participation.

1. The Problem

The internet was not built with privacy as a default. Every layer — DNS, HTTP, SMTP, the TCP/IP stack itself — was designed for openness, not confidentiality. Privacy has been retrofitted onto this foundation for 30 years, producing a patchwork of tools that are either technically weak, commercially compromised, or simply too fragmented to use effectively.

1.1 Fragmentation

A privacy-conscious user today requires: a VPN for traffic encryption, a separate encrypted messenger, a hardware wallet for key storage, a hardened browser, a password manager, and a 2FA application. Each tool represents a separate attack surface, a separate data relationship, and a separate identity to manage.

1.2 Commercial Misalignment

The majority of consumer VPN providers log connection metadata and sell it to data brokers. Biometric authentication systems store raw biometric data in centralized databases. Cloud storage providers hold encryption keys on behalf of their users, making compliance with government data requests trivially easy.

1.3 The Seed Phrase Problem

Non-custodial cryptocurrency wallets require users to memorize or securely store a 12–24 word seed phrase. This single point of failure is responsible for billions of dollars in permanent asset loss annually.

1.4 Nation-State Threat Model

Privacy tools designed for casual use are inadequate for the threat model faced by journalists, political dissidents, legal professionals, and enterprise users operating in adversarial environments. These users require cryptographic guarantees, not policy promises.

2. The Veil Solution

Veil is a single protocol that addresses all four problems simultaneously. The entry point is a biometric authentication event that derives a deterministic cryptographic seed from the user's biometric embeddings. This seed is the root of all downstream security: wallet keys, message encryption keys, VPN authentication, and workspace access.

2.1 The Stack

LayerComponentTechnical FoundationStatus
IdentityBiometric SSIShamir's Secret Sharing, fuzzy extractor, 3-of-5 thresholdLive
CommunicationsE2EE MessengerDouble Ratchet, sealed sender, forward secrecyLive
WalletNon-custodialMulti-chain, in-app DEX, biometric key recoveryLive
NetworkDecentralized VPNWireGuard, Kademlia DHT (@veil/p2p), operator nodesLive
BrowserHardened BrowserFirefox fork, 52 privacy defaults, uBlock OriginLive
WorkspaceEncrypted WorkspaceAES-256-GCM client-side, node-distributed, CRMBeta

3. Biometric Self-Sovereign Identity

3.1 Architecture Overview

Veil's identity layer implements a biometric-derived self-sovereign identity system. The user's identity is not stored on any server — it is reconstructed on demand from the user's own biometric data. Three modalities are captured simultaneously: facial recognition, voice recognition, and liveness detection.

3.2 Fuzzy Extractor

A fuzzy extractor is applied to the combined biometric embedding to produce a stable, deterministic output even with up to 15% variation in the input signal.

biometric_embedding → fuzzy_extractor → deterministic_seed (256-bit)

3.3 Shamir's Secret Sharing — 3-of-5 Threshold

ShardLocationType
1Device encrypted storage (primary)Local
2Separate device partition / TPMLocal
3VPN node-1 (encrypted shard only)Network
4VPN node-2 (encrypted shard only)Network
5VPN node-3 (encrypted shard only)Network

3 of 5 shards are required to reconstruct the master key. Raw biometric data never leaves the user's device.

4. Post-Quantum Cryptography

4.1 Why Classical Cryptography Fails Against Quantum Computers

The cryptographic primitives securing the internet today — ECDSA signatures, X25519 key exchange, and Curve25519-based Diffie-Hellman — all derive their security from the hardness of the elliptic curve discrete logarithm problem. Shor's algorithm, running on a sufficiently powerful quantum computer, solves this problem in polynomial time. The result: every ECDSA signature becomes forgeable, every X25519 key exchange becomes transparent, and every Curve25519-based session key becomes recoverable. This is not a theoretical concern — it is a mathematical certainty once the hardware matures.

RSA suffers the same fate via Shor's algorithm applied to integer factorization. AES-256 is weakened by Grover's algorithm (reducing effective security from 256 bits to 128 bits) but remains viable. The consequence: the entire asymmetric cryptography layer — the layer responsible for key exchange, digital signatures, and identity — must be replaced.

4.2 Harvest-Now-Decrypt-Later — Why Urgency Matters Today

Nation-state adversaries are already archiving encrypted traffic at scale. The strategy is simple: collect ciphertext today, store it indefinitely, and decrypt it once quantum hardware is available. Any data encrypted with X25519, ECDH, or RSA today is already compromised in a future-tense sense. This includes VPN sessions, encrypted messages, wallet key derivation material, and biometric shard transmissions. Protocols that plan to migrate to post-quantum cryptography "when quantum computers arrive" have already failed the users whose data is being harvested now.

Veil's decision to implement PQC across all layers at launch — not as a migration — is a direct response to the harvest-now-decrypt-later threat model. There is no window of vulnerability because there was never a classical-only phase.

4.3 NIST PQC Standards — Finalized August 2024

After a multi-year competition and standardization process, NIST finalized three post-quantum cryptographic standards in August 2024. These are not experimental proposals — they are the official NIST-standardized replacements for classical asymmetric cryptography.

StandardAlgorithmTypeSecurity Basis
FIPS 203ML-KEM-768Key Encapsulation MechanismModule-LWE (lattice)
FIPS 204ML-DSA-65Digital SignatureModule-LWE / SIS (lattice)
FIPS 205SLH-DSA-SHAKE-128sHash-Based SignatureSHAKE-256 (hash functions)

ML-KEM (Module Lattice Key Encapsulation Mechanism) replaces X25519 and ECDH for key exchange. ML-DSA (Module Lattice Digital Signature Algorithm) replaces ECDSA and Ed25519 for signing. SLH-DSA (Stateless Hash-based Digital Signature Algorithm) provides a conservative hash-based fallback with security that depends only on the properties of hash functions — not lattice problems.

4.4 Veil Implementation — Every Layer

LayerAlgorithmsReplacesStatus
Core (@veil/core)ML-KEM-768, ML-DSA-65, SLH-DSA-SHAKE-128sAll classical asymmetric primitivesComplete
VPN (@veil/vpn-node)ML-KEM-768 pre-handshake wrap; hybrid TLS X25519Kyber768 on all nodesBare Curve25519 Noise handshakeComplete
Messenger (@veil/messenger)ML-KEM-768 Double Ratchet + ML-DSA-65 per-message signaturesX3DH + X25519 + Ed25519Complete
WalletERC-4337 smart accounts with ML-DSA-65 signingECDSA (secp256k1)Pre-token
Biometric ShardsML-KEM-768 wrapped SSS shards in transit and at restClassical encryption of shard transportComplete

4.5 VPN — ML-KEM-768 Over WireGuard

WireGuard's Noise_IKpsk2 handshake uses Curve25519 — vulnerable to Shor's algorithm. Veil wraps every WireGuard session with a two-step ML-KEM-768 pre-handshake: the client sends its ML-KEM-768 public key (1184 bytes) to the node; the node encapsulates a fresh shared secret (1088-byte ciphertext), derives a WireGuard PSK from the ML-KEM shared secret via HKDF-SHA512, and returns the PSK encrypted under the ML-KEM-derived session key. The Curve25519 Noise handshake then proceeds — but the WireGuard PSK now requires breaking ML-KEM-768 before any classical traffic is exposed. Hybrid security: a quantum adversary must break both layers.

// Session material per VPN connection
sessionKey  = HKDF-SHA512(mlKemSharedSecret ‖ wgPsk)  // 32 bytes
wgPsk       = fresh per-session (32 bytes)
pqcSessionKeyId = SHA-256(sessionKey)                  // safe to log

4.6 Messenger — Quantum-Resistant Double Ratchet

The Signal Protocol's X3DH key agreement uses X25519 — broken by Shor's algorithm. Veil replaces X3DH entirely with a three-step ML-KEM-768 handshake. The initiator generates ephemeral ML-KEM-768 and ML-DSA-65 keypairs and sends a signed handshake init. The responder encapsulates to the initiator's KEM public key, generates its own keypairs, and returns the ML-KEM ciphertext. Both parties derive the same root key. Each subsequent message ratchets with a fresh ephemeral ML-KEM-768 keypair — the shared secret for message N is derived from the previous root key and the new KEM encapsulation:

rootKey[N] = HKDF-SHA512(rootKey[N-1] ‖ kemSharedSecret[N])
// old root keys zeroed immediately — forward secrecy preserved

Every message is signed with ML-DSA-65 before encryption and verified after decryption. Wire sizes: ML-KEM-768 public key 1184 bytes, ciphertext 1088 bytes; ML-DSA-65 public key 1952 bytes, signature 3309 bytes.

4.7 Wallet — First Quantum-Resistant Wallet on Base

Ethereum's ECDSA signature scheme (secp256k1) is directly broken by Shor's algorithm. Veil implements ERC-4337 smart accounts where the signature verification step calls a custom validator that verifies ML-DSA-65 signatures instead of ECDSA. The user's ML-DSA-65 keypair is derived from their biometric seed and never touches secp256k1. This makes Veil the first quantum-resistant wallet on Base and, to our knowledge, on any major EVM L2. Ethereum's own PQC migration targets 2029 at earliest; Veil ships it today.

4.8 Quantum Resistant by Default

PQC is not a configuration option or a premium tier in Veil — it is the only mode. Every user who authenticates with Veil gets ML-KEM-768 key encapsulation, ML-DSA-65 signatures, and quantum-resistant session keys from their first interaction. There is no classical fallback path. Harvest-now-decrypt-later adversaries collecting Veil traffic today will find only data protected by NIST-standardized lattice-based cryptography with 128-bit post-quantum security level.

5. Token Economics

4.1 VEIL Token

VEIL is a utility token deployed on Base (Ethereum L2). It serves three functions: payment for subscriptions and VPN bandwidth, staking to secure the node network and earn revenue share, and governance via DAO proposals and voting. Total supply is fixed at 200,000,000 VEIL. No additional tokens can be minted.

4.2 Token Allocation — v4 Final

AllocationVEIL% SupplyVesting / Notes
Founding Architect50,000,00025%4yr vest, 1yr cliff
Protocol Treasury (DAO)60,000,00030%DAO controlled — proposals required for spend >$50K
Investors / Grants30,000,00015%Per-deal — minimum 2yr vest, 6mo cliff
Airdrop / Community20,000,00010%Tiered cliff + linear vest
Ecosystem Fund (DAO)26,000,00013%DAO governed — advisors, legal, grants, node incentives
Liquidity Provision14,000,0007%DEX seeding on Aerodrome (Base) at token launch
TOTAL200,000,000100%Fixed supply — no inflation possible

Burn consideration: Veil Core Team may propose burning 5–10M tokens from the Founding Architect allocation at a significant protocol milestone as a community alignment signal. Subject to DAO ratification.

4.3 Staking Economics

Node operators stake 500 VEIL per node. 40% of all subscription revenue flows to stakers via on-chain formula. DAO votes to adjust the percentage.

baseAPY = (treasury revenue × 40%) ÷ (total staked VEIL × tokenPrice) × 100
ParameterValueGovernance
Node Revenue Share40% of subscription revenueDAO vote to adjust
VPS Stake Requirement500 VEIL per node (~$25 at launch)DAO adjustable
Hardware Node Multiplier1.5×DAO adjustable
Genesis APY Target200–250%Self-regulates with staking participation
Staking Lock Period60 daysBoth direct and delegated
Minimum Delegation100 VEILDAO adjustable

4.4 Airdrop Tiers

TierPositionVEILVest Schedule
Genesis1–10100,0003mo cliff, 12mo linear + DAO council seat offer
Founding Member11–10020,0002mo cliff, 9mo linear
Early Adopter101–5005,000No cliff, 6mo linear
Pioneer501–2,0001,000No cliff, 3mo linear
Supporter2,001–10,000200No cliff, 1mo linear
Community10,001+50No cliff, immediate

4.5 Quest System — ZK-Verified Points

Beta users earn Veil Points through verifiable on-chain actions. Points convert to VEIL at token launch at a 1:1 ratio. Zero-knowledge proofs (circom + snarkjs, Groth16) allow users to prove activity without revealing identity or content.

QuestPointsTypeZK Circuit
Biometric Enrollment500One-timeenrollment.circom
Send 10 Encrypted Messages250Weeklymessage_count.circom
VPN Session — 1 hour100Dailyvpn_session.circom
Wallet Transaction200One-timeOn-chain tx hash
Run a Node — 24 hours1,000Weeklynode_uptime.circom
Referral Signup500Per referralreferral.circom
Verified Bug Report1,000Manual approvalManual
Complete Onboarding750One-timeComposite

Individual earning cap: 50,000 Points per user pre-token launch. Prevents allocation concentration while rewarding genuine protocol usage.

6. DAO Governance

ParameterValue
Quorum4% of circulating VEIL
Simple Majority>50% — protocol parameter changes
Supermajority>66% — constitutional changes, acquisitions
Proposal Threshold10,000 VEIL
Council Candidacy50,000 VEIL
Discussion Period5 days
Voting Period3 days
Treasury Spend Threshold>$50,000 requires full proposal
Monthly Treasury ReportOn-chain, mandatory

Council composition: Founding Architect holds 1 permanent seat. Community always holds (team seats + 1) community seats — currently 1 team + 2 community = 3 total council. Community seats elected annually by VEIL token holders.

7. Smart Contracts

ContractAddress (Base Sepolia)Function
VeilPoints0x8F446afA9877C79F3CCb5eaA5b6503752817223fNon-transferable ERC-20 pre-token loyalty instrument
VeilToken0xeb9D2B0536Cc2FbFf5F00de9c77315de1Cb1B8fcMain VEIL ERC-20, fixed 200M supply
VeilDAO0x28D8A7103B6CFCbbb5dB2AD56ffa8163e4Ef21b5Governance proposals, voting, council
VeilNodeRegistry0x38a2bBb2f54b5b20aF09E1a65F2617a7A1Dc796FOn-chain node registration, stake verification
VeilTreasury0x7b351E15af20d384F93f22eB9861f46e6069E057DAO-controlled treasury with spend controls
VeilStaking0x49C803ae29B6cDADF89ccfD0CB6e77A7F1F069b1Direct + delegated staking, reward distribution

All contracts currently on Base Sepolia (testnet). Mainnet deployment Q3 2027 concurrent with token launch. Full security audit required prior to mainnet deployment.

8. Roadmap

MilestoneTargetStatus
Monorepo — 1,000+ tests, 20 packagesCompletedDone
3 production VPN nodes liveMay 2026Done
6 smart contracts on Base SepoliaMay 2026Done
@veil/p2p — Kademlia DHT node discoveryMay 2026Done
@veil/zkproofs — ZK quest verificationMay 2026Done
Encrypted workspace + CRMMay 2026Done
PQC Phase 1 — Core + VPN + Messenger (ML-KEM-768, ML-DSA-65, SLH-DSA)May 2026Complete
Beta launchJune 2026In Progress
Waitlist + Veil Points liveJune 2026In Progress
Closed beta — first 50 usersJune 2026Upcoming
Angel round close ($175K–$300K)Q3 2026Upcoming
PQC Phase 2 — Wallet (ERC-4337 ML-DSA-65) + PQC security auditPre-tokenPre-token
Smart contract security auditQ4 2026Planned
Testnet launchQ1 2027Planned
Token launch + DEX (Aerodrome / Base)Q3 2027Planned
CEX listingQ4 2027–Q2 2028Planned

9. Team

Veil is built and operated by Veil Core Team. The founder operates permanently and anonymously — no real name is public, consistent with the protocol's privacy-first ethos.

RoleResponsibilities
Founding ArchitectSole founder. Lead Engineer, Operations Manager, DAO Council Member. Responsible for all protocol engineering, infrastructure, and technical direction. Builds the entire protocol solo using Claude Code.

The founding principle: Veil Core Team uses Veil as the exclusive internal communications, file storage, and operational stack from day one. The protocol must be good enough to run on itself before it is offered to anyone else.