Documentation Index
Fetch the complete documentation index at: https://docs.monaris.co/llms.txt
Use this file to discover all available pages before exploring further.
How private payments work today
Monaris supports two modes for sending private payments. The system selects the optimal mode automatically based on where the sender’s funds are.Mode A — Direct Shield to Recipient
When: You have public USDC and want to pay someone privately. Your USDC goes directly from your public wallet into the recipient’s private balance — in a single transaction. What happens:- Monaris resolves the recipient’s private address from their public address (deterministic — see Key Derivation)
- USDC is approved to the privacy contract
- A shield transaction is built with the recipient’s private address as the target
- One gasless transaction — USDC enters the recipient’s private balance directly
- Private receipt generated, invoice marked cleared, Score updated
Mode B — Private Transfer (Pool to Pool)
When: You already have shielded USDC from a previous shield operation. Funds move entirely within the private pool. The sender’s shielded balance decreases; the recipient’s shielded balance increases. The on-chain footprint is a single ZK proof. What happens:- Sender’s wallet initializes, checks shielded balance
- Recipient’s private address is resolved
- A Groth16 proof is generated in-browser (~10–30 seconds)
- The proof is submitted on-chain — funds move within the pool
- Private receipt generated, invoice marked cleared, Score updated
End-to-end: what a private payment looks like
After payment, the seller can:- Keep funds shielded — maintain private balance for future private payments
- Unshield to public wallet — move funds back to their 0x address anytime
- Pay their own vendors privately — private cashflow chain
V2: Private Payment Router — The Future of Private Commerce
Coming in V2 — the architecture below describes where Monaris Private is heading.
What the Private Payment Router does
The Private Payment Router sits between every Monaris product and the settlement layer. Every invoice payment, every BNPL repayment, every payroll transfer — all route through it automatically.Private cashflow — a new primitive
When sellers receive payments through the Private Payment Router, something powerful happens: they build private cashflow history.- Sellers build financial history without exposing it publicly
- Competitors cannot map client relationships, revenue, or vendor networks
- Payment patterns remain private — no one can analyze frequency, size, or timing
- Credit decisions still work — the MCA has access to verified internal data, not public chain data
What changes for users
| Feature | V1 (now) | V2 (Private Router) |
|---|---|---|
| Private payments | Opt-in per payment | Default for all payments |
| Seller receives | Public or private (sender chooses) | Private by default |
| Cashflow history | Public chain visible | Private, verified internally |
| Score calculation | On-chain signals | Private verified signals |
| Compliance | Manual selective disclosure | Automated compliance proofs |
| Payroll | Public transactions | Fully private disbursements |
| BNPL repayment | Public transactions | Private settlement |
Selective Disclosure in a private-first world
Even with all payments private by default, users retain full control over what they prove:- “This invoice was paid on time” — ZK proof, no amount revealed
- “My monthly revenue exceeds $10,000” — range proof, no individual payments revealed
- “My Score is above 700” — Score proof, no transaction history revealed
- “I paid this vendor” — payment proof for compliance, no other payments revealed
The full privacy architecture
This is the endgame: a financial system where privacy is not a feature you toggle on — it is the infrastructure everything runs on. Payments are private. Cashflow is private. Credit decisions are made on verified private data. And the user controls exactly what to prove, to whom, and when.Related
- Key Derivation — how the private wallet is created
- Shield & Unshield Flows — how funds enter and exit the shielded pool
- Secrets as a Service — programmable privacy rules and selective disclosure
