DeFi Compliance: Verification Without Disclosure

Eric Beans, CEO, H33.ai, Inc.
May 9, 2026

The central tension in decentralized finance compliance is simple to state and, until now, impossible to resolve. Regulators need assurance that participants are who they claim to be, that sanctioned entities are excluded, and that jurisdiction rules are enforced. Users need privacy. These two requirements have been treated as fundamentally incompatible. Every compliance solution to date has forced a choice: give regulators access to user data, or give users privacy. You cannot have both.

This framing is wrong. It is wrong because it assumes that the only way to demonstrate compliance is to disclose the data that compliance was checked against. It assumes that knowing someone passed KYC requires knowing who they are. It assumes that verifying sanctions screening requires seeing the name that was screened. It assumes that confirming jurisdiction eligibility requires knowing the jurisdiction.

None of these assumptions are necessary. Compliance can be verified without disclosure. The proof is the disclosure. The data stays private.

The Disclosure Problem

To understand why verification without disclosure matters, consider how DeFi compliance works today in the systems that have implemented it.

A user wants to participate in a regulated DeFi protocol. The protocol requires KYC. The user submits identity documents, typically a passport or government ID, along with proof of address and possibly additional documentation, to a third-party KYC provider. The provider verifies the documents, performs sanctions screening against OFAC, EU, UN, and other sanctions lists, and determines the user's jurisdiction. If everything checks out, the provider issues a credential, perhaps a soulbound token or a signed attestation, that the protocol checks before granting access.

In this model, the user's personal information has been shared with at least one third-party entity. The KYC provider now has the user's passport number, date of birth, address, photograph, and nationality. This data is stored in the provider's systems, subject to the provider's security practices, retention policies, and jurisdictional obligations. The user has no control over this data once it is shared. If the provider is breached, the data is exposed. If the provider is compelled by a government to share data, it is shared. If the provider goes out of business, the data may be transferred to an unknown successor entity.

This is not a hypothetical concern. KYC providers have been breached. Identity databases have been stolen. Millions of users have had their personal information exposed because they complied with compliance requirements. The system designed to prevent financial crime has itself become a target for a different kind of crime: identity theft enabled by the accumulation of identity data in centralized databases.

The problem compounds in DeFi because composability means a user may need to pass KYC on multiple protocols. Each protocol may use a different KYC provider. The user's identity data is now spread across multiple providers, each with their own security posture and each representing an independent attack surface. The more protocols the user interacts with, the more copies of their identity data exist, and the higher the probability that at least one copy will be compromised.

What Regulators Actually Need

The regulatory requirements for DeFi compliance are often described in terms of identity disclosure: "know your customer." But what regulators actually need is not identity data itself. What they need is assurance about specific properties of the transacting parties.

Does this person satisfy KYC requirements? The regulator does not need to know the person's name, passport number, or address to get this assurance. They need to know that a qualified verification process was performed, that the process was performed by a trusted entity, and that the result was positive. The underlying data is irrelevant to the regulatory question.

Is this person on any sanctions list? The regulator does not need to see the person's name screened against every list. They need to know that screening was performed against the relevant lists, at the relevant time, and that the result was negative. The screening result is the regulatory requirement. The screening input is a means to an end.

Is this person in an eligible jurisdiction? The regulator does not need to know which jurisdiction the person is in. They need to know that the person's jurisdiction was checked against the protocol's permitted jurisdictions and that the result was positive. The specific jurisdiction is not the regulatory concern. The eligibility determination is.

Is this person an accredited investor? The regulator does not need to see the person's tax returns, bank statements, or employment records. They need to know that accreditation status was verified by a qualified entity and that the person met the applicable thresholds. The underlying financial data is not the regulatory requirement. The accreditation determination is.

In every case, the regulatory requirement is a property, not a disclosure. The property can be proven without disclosing the underlying data. This is not a legal argument. It is a mathematical fact.

Zero-Knowledge Compliance

Zero-knowledge proofs allow one party to prove a statement to another party without revealing any information beyond the truth of the statement itself. This is the mathematical foundation for verification without disclosure.

H33's ZK-KYC infrastructure applies zero-knowledge proofs to compliance verification. The system proves specific compliance properties without disclosing any underlying data.

Here is how it works in practice. A user completes KYC with a verification provider. The provider verifies the user's identity documents and performs sanctions screening. Instead of issuing a simple pass/fail credential, the provider creates a zero-knowledge proof. The proof attests that the user's identity was verified according to the applicable standard, that the user's name was screened against the relevant sanctions lists with a negative result, and that the user's jurisdiction is among those permitted by the protocol. The proof reveals nothing else. Not the user's name. Not their nationality. Not their address. Not which specific sanctions lists were checked or what specific verification standard was applied.

The proof is mathematically sound. It cannot be forged. A malicious party cannot create a valid proof without actually passing the compliance checks. And the proof can be verified by anyone, without any interaction with the provider that created it or the user it pertains to.

When a regulator examines a transaction, they verify the zero-knowledge compliance proof. The proof tells them everything they need to know: KYC was performed, sanctions were checked, jurisdiction was verified, accreditation was confirmed. They can be mathematically certain of these facts. And they learn nothing about the user's personal information in the process.

Compliance Proofs on Encrypted Data

Zero-knowledge proofs solve the disclosure problem at the output layer: the verifier learns the compliance result without learning the underlying data. But what about the computation layer? When the compliance check is performed, does someone, somewhere, still need to see the user's data in plaintext?

In most zero-knowledge systems, yes. The prover, the entity that creates the zero-knowledge proof, needs access to the plaintext inputs. The prover sees the user's identity data, performs the compliance checks, and then creates a proof that conceals the inputs from everyone else. This is better than full disclosure, because only one entity sees the data, but it still requires a trusted prover with plaintext access.

H33's fully homomorphic encryption (FHE) layer eliminates this remaining exposure. Compliance checks execute on encrypted data. The user's identity information is encrypted before it leaves their device. The compliance computation, including KYC verification, sanctions screening, and jurisdiction checking, runs entirely on ciphertexts. The system that performs the compliance check never sees the plaintext data. It operates on encrypted inputs and produces encrypted results.

The combination of FHE and zero-knowledge proofs creates a compliance system where no entity, at any point in the process, needs plaintext access to user data. The user encrypts their data. The compliance system computes on the encrypted data. The result is a zero-knowledge proof that the compliance checks passed. The proof is verified by the protocol, the regulator, or any interested party. At no point does any party other than the user see the underlying data.

This is not incrementally better privacy. It is a categorical difference. The data does not exist in plaintext outside the user's control. There is no database to breach. There is no provider to compel. There is no successor entity to worry about. The data stays with the user. The proof is all that travels.

How the Proof Layer Works

The H33 compliance proof layer operates as infrastructure that tokenization platforms, DeFi protocols, and financial applications integrate with. The architecture has four distinct phases.

In the enrollment phase, the user establishes their compliance credentials. They complete identity verification through a standard KYC process. But instead of storing the result as a record in a provider's database, the result is encrypted and signed. The user holds the encrypted credential. The verification provider holds nothing after the process completes. The credential is bound to the user's cryptographic identity and cannot be transferred or used by anyone else.

In the proof generation phase, the user generates a zero-knowledge compliance proof for a specific transaction or protocol. The proof demonstrates that their encrypted credentials satisfy the protocol's compliance requirements. The user's device performs this computation locally, using the encrypted credential as input. The output is a compact proof that reveals only the compliance result.

In the verification phase, the protocol or counterparty verifies the proof. Verification is fast, typically completing in microseconds. The verifier learns that the user satisfies the compliance requirements. They learn nothing else about the user.

In the attestation phase, the verified compliance proof receives an H33-74 attestation. This 74-byte receipt permanently records that the compliance check was performed, what requirements were checked, and that the result was positive. The attestation is post-quantum secure, meaning it remains valid against future quantum computers. It is independently verifiable by any party at any future time. And it is compact enough to store on-chain without meaningful cost.

Satisfying the Travel Rule

One of the most challenging compliance requirements in the cryptocurrency space is the Financial Action Task Force (FATF) Travel Rule, which requires virtual asset service providers (VASPs) to exchange originator and beneficiary information for transactions above a threshold. The Travel Rule appears to require precisely the kind of data disclosure that privacy-preserving compliance seeks to avoid.

H33's approach resolves this tension through a technique called selective disclosure with verification. The Travel Rule requires that the originating VASP share specific information about the sender with the beneficiary VASP. But the Travel Rule does not require that this information be stored in plaintext by the beneficiary VASP, or that it be transmitted in plaintext between them.

Using H33's infrastructure, the originating VASP can provide a zero-knowledge proof to the beneficiary VASP demonstrating that the required originator information exists, has been verified, and satisfies the Travel Rule requirements. If a regulator requests the underlying information, the originating VASP can selectively disclose specific fields, with the user's consent or under legal compulsion, while keeping everything else private. The zero-knowledge proof ensures that the beneficiary VASP had assurance of compliance at the time of the transaction, even without receiving plaintext data.

This approach satisfies the regulatory intent of the Travel Rule, ensuring that VASPs have assurance about their counterparties, while minimizing the spread of personal information across the financial system. It is a practical demonstration that verification without disclosure is not just a theoretical possibility but a deployable solution for real regulatory requirements.

The Composability Advantage

Privacy-preserving compliance has a powerful secondary benefit: it enables compliance composability without data proliferation.

In the current model, if a user is compliant on Protocol A and wants to interact with Protocol B, they typically need to go through KYC again on Protocol B. This is because Protocol A's compliance provider cannot share the user's data with Protocol B's compliance provider without the user's consent and without creating another copy of the data. Each protocol is an island of compliance, and moving between islands requires repeating the entire process.

With zero-knowledge compliance proofs, composability is straightforward. The user generates a proof that they satisfy Protocol B's requirements, using the same encrypted credentials they used for Protocol A. Protocol B verifies the proof. No new KYC process. No data sharing between providers. No additional copies of the user's data. The proof is self-contained and independently verifiable.

This composability extends across chains. A user who has compliance credentials on Ethereum can generate a proof for a protocol on Solana or Polygon or any other chain. The proof format is universal. The verification is standard. The user's data stays in one place, under the user's control, regardless of how many protocols, chains, or jurisdictions they interact with.

For the DeFi ecosystem, this is transformative. Compliance becomes a portable property of the user, not a per-protocol gate. The friction of regulatory compliance, which currently fragments the DeFi ecosystem into compliant and non-compliant silos, is dramatically reduced. Users can move freely between protocols while maintaining continuous compliance. Protocols can require compliance without requiring data disclosure. Regulators can verify compliance without accessing user data.

Post-Quantum Security

Privacy-preserving compliance proofs are only as valuable as their security guarantees. A compliance proof that can be broken by a future attacker is not a compliance proof. It is a temporary assertion with an expiration date determined by advances in cryptanalysis or quantum computing.

H33's compliance proofs are backed by three independent hardness assumptions. Breaking the proof system requires simultaneously breaking three fundamentally different mathematical problems. This is not a belt-and-suspenders approach to security. It is a recognition that the compliance proofs produced today must remain valid for years or decades. A tokenized security issued today with a thirty-year maturity needs compliance proofs that remain verifiable for thirty years. A regulatory examination conducted five years from now needs to verify proofs produced today. The proofs must be durable.

Post-quantum security ensures this durability. Even if quantum computers capable of breaking individual cryptographic schemes become available, the compliance proofs remain valid because all three underlying hardness assumptions would need to be broken simultaneously. This is the level of security assurance that institutional-grade compliance infrastructure requires.

What This Means for Users

For users, verification without disclosure changes the compliance experience fundamentally. Today, participating in regulated DeFi means surrendering personal data to multiple entities, accepting the risk that this data will be breached or misused, and repeating the process for every new protocol. It is burdensome, risky, and degrading. Many users choose to avoid regulated protocols entirely, not because they are non-compliant, but because the compliance process is unacceptably invasive.

With H33's approach, the user completes identity verification once. Their credentials are encrypted and stored under their control. When they interact with a new protocol, they generate a proof. The proof takes seconds. No forms. No document uploads. No waiting for manual review. And no data leaves the user's control. The user maintains full sovereignty over their personal information while participating fully in regulated financial markets.

This is not a minor improvement in user experience. It is a fundamental change in the relationship between compliance and privacy. The user does not trade privacy for access. They prove compliance while preserving privacy. These are not competing goals. They are complementary properties of a well-designed system.

What This Means for Institutions

For institutions, verification without disclosure eliminates one of the most significant risks in DeFi compliance: the liability of holding user data. Every institution that collects KYC data is responsible for protecting that data. Data breaches result in regulatory fines, lawsuits, reputational damage, and remediation costs. The more data an institution holds, the greater its liability.

With zero-knowledge compliance, institutions never hold the underlying user data. They hold proofs. Proofs cannot be used for identity theft. Proofs do not contain personal information. A database of proofs, even if breached, reveals nothing about the users. The institution's liability is dramatically reduced because the attack surface is dramatically reduced.

This also simplifies cross-border compliance. An institution operating in multiple jurisdictions must comply with data protection regulations in each jurisdiction: GDPR in the EU, CCPA in California, PIPEDA in Canada, LGPD in Brazil, and dozens of others. Each regulation imposes different requirements for data storage, processing, transfer, and retention. Compliance with all of them simultaneously is complex and expensive. With zero-knowledge compliance, the institution does not process or store personal data. The data protection compliance burden is virtually eliminated because the institution simply does not have the data.

The Proof Is the Disclosure

The phrase "verification without disclosure" sounds like a paradox. How can you verify something without disclosing the thing being verified? The answer is that the proof is the disclosure. The proof discloses the compliance result, which is the only thing that needs to be disclosed. Everything else is private.

This is not a compromise. It is a better system for everyone involved. Users get privacy. Regulators get assurance. Institutions get reduced liability. Protocols get composable compliance. The proof is compact, verifiable, durable, and post-quantum secure. It works today, and it will work in a post-quantum future.

The fundamental tension in DeFi compliance, the tension between regulatory transparency and user privacy, is resolved. Not by choosing one over the other. By recognizing that what regulators need is not data. It is proof. And proof can be provided without disclosing anything but the truth of the statement being proven.

The future of DeFi compliance is not more disclosure. It is better proof. H33 is building that future today.

See Verification Without Disclosure

Learn how H33 enables DeFi compliance that satisfies regulators without compromising user privacy. Schedule a technical demonstration.

Schedule a Demo