LITEPAPER V3.0

THE ARCHITECTURE
OF SILENCE

Zero-Knowledge Privacy Rails on Solana.
Technical specification & protocol vision.

In simple terms: $NORTH lets you send and receive value on Solana
without anyone seeing the amounts.

PROTOCOL SENTINEL
NETWORK SOLANA DEVNET
VERSION 3.0
DATE FEBRUARY 2026
TABLE OF CONTENTS
SECTION 01

Vision & Mission
The Grey Space

"The world is noisy. We have built the silence. The network validates — only the sender and receiver know the cargo." — NORTH PROTOCOL MANIFESTO

In 2026, every transaction on Solana is a public data point. Payrolls, treasury movements, corporate strategies, personal transfers — all exposed, all traceable, all exploitable. Solana won the speed war, but absolute transparency has become a strategic liability.

$NORTH Protocol operates in what we call the Grey Space — the necessary middle ground between total transparency and total anonymity. We are not building a tool for hiding. We are building infrastructure for institutional-grade privacy that coexists with regulatory compliance.

The Grey Space is where the real world operates. Banks don't broadcast wire transfers. Hospitals don't publish patient payments. Yet today, any entity operating on Solana exposes every financial interaction to competitors, adversaries, and front-running bots. $NORTH closes this gap.

👁
THE PROBLEM
Every on-chain transaction reveals amounts, participants, and timing. MEV bots extract value from public mempools. Pattern analysis destroys financial privacy.
THE SOLUTION
Encrypted deposits, confidential transfers, and ZK-proven withdrawals. The network validates integrity without knowing the content. Privacy with provable compliance.

Our core thesis: Privacy is not the opposite of compliance — it is a prerequisite for it. Institutions cannot adopt blockchain at scale without the ability to protect sensitive financial data while still satisfying auditors and regulators.

◆ ◆ ◆
SECTION 02

Technical Architecture
The Sentinel Protocol

Sentinel is the core Solana program deployed on devnet at address C2WJzwp5XysqRm5PQuM6ZTAeYxxhRyUWf3UJnZjVqMV5. It contains 16 on-chain instructions, 7 account types, and 19 custom error codes. Built with Anchor framework 0.31.1.

The architecture consists of three interlocking layers:

SENTINEL PROTOCOL ARCHITECTURE
LAYER 01 — CORE SILENT RAILS Initialize · Pause · Unpause · Seal · Deactivate LAYER 02 — CORE ZK HANDSHAKES & VAULTS Create Handshake · Revoke Handshake · Initialize ZK Vault · Prepare Receive SOL · Verify State LAYER 03 — ZK PRIVACY CONFIDENTIAL TRANSFERS Deposit · Deposit Token · Withdraw · Withdraw Token · Transfer · Transfer Token 5 CORE instructions 4 CORE instructions 6 ZK instructions ◆ $NORTH TOKEN GATE

Layer 01 — Silent Rails (CORE): The compliance layer. Each Rail is a PDA owned by an authority who must hold $NORTH tokens. Rails can be paused for investigation, sealed with an immutable audit hash, or permanently deactivated with a reason code. This gives institutions the kill-switch and audit trail they require. 5 CORE instructions.

Layer 02 — ZK Handshakes & Vaults (CORE): The privacy layer. Handshakes establish a zero-knowledge link between two parties using a cryptographic commitment and nullifier. The nullifier registry prevents replay and double-use. Each rail has an ElGamal-encrypted vault with per-asset VaultAssetState isolation and strict PDA authority constraints. 4 CORE instructions.

Layer 03 — Confidential Transfers (ZK): The value layer. SOL and SPL tokens can be deposited into vaults, transferred between vaults confidentially, and withdrawn with zero-knowledge proofs. Amounts are encrypted and transfer flows are protected by nonce uniqueness controls, so integrity is preserved across multi-asset movement. 7 ZK instructions (deposit, deposit_token, withdraw, withdraw_token, confidential_transfer, confidential_transfer_token, get_balance).

INSTRUCTIONLAYERTYPEDESCRIPTION
initialize_railRailsCORECreate a new privacy rail (requires $NORTH)
pause_railRailsCOREPause all operations on a rail
unpause_railRailsCOREResume operations
seal_railRailsCOREImmutable audit seal (32-byte hash)
deactivate_railRailsCOREPermanent shutdown with reason code
create_handshakeZK LayerCOREEstablish ZK link (commitment + nullifier)
revoke_handshakeZK LayerCORERevoke an active handshake
initialize_zk_vaultZK LayerCORECreate ElGamal encrypted vault
prepare_receive_solZK LayerCOREPrepare vault to receive confidential transfers
depositTransfersZKDeposit SOL into vault pool
deposit_tokenTransfersZKDeposit SPL token into vault
withdrawTransfersZKWithdraw SOL with ZK proof
withdraw_tokenTransfersZKWithdraw SPL token with proof
confidential_transferTransfersZKPrivate SOL transfer between vaults
confidential_transfer_tokenTransfersZKPrivate SPL transfer between vaults
get_balanceTransfersZKQuery encrypted vault balance

Total: 16 instructions — 9 CORE instructions for infrastructure and compliance, 7 ZK instructions for privacy-preserving value transfers.

◆ ◆ ◆
SECTION 03

Transaction Flow
& Privacy Model

A complete privacy cycle in Sentinel follows five sequential phases. Each phase is a real Solana transaction, verifiable on-chain.

SENTINEL TRANSACTION LIFECYCLE
INIT RAIL + $NORTH gate HANDSHAKE commit + nullifier ZK VAULT ElGamal keypair DEPOSIT SOL or SPL token TRANSFER vault → vault PHASE 1 PHASE 2 PHASE 3 PHASE 4 PHASE 5 Each phase = 1 Solana transaction · verifiable on Solscan devnet

Privacy model: The current implementation uses encrypted amount fields (64-byte ElGamal ciphertexts) and 128-byte proof slots. The on-chain program validates proof length and structural integrity. Phase 3 of the roadmap will integrate Groth16 circuits for full zero-knowledge proof verification, making amounts mathematically invisible rather than just encrypted.

Nullifier model: Each handshake consumes a unique nullifier. The NullifierRegistry marks it as spent with a timestamp. Attempting to reuse a nullifier triggers NullifierAlreadyUsed — the same double-spend prevention model proven by Zcash and Tornado Cash.

◆ ◆ ◆
SECTION 04

$NORTH Tokenomics
The Key to Silence

$NORTH is not a utility afterthought — it is the access key to the entire privacy infrastructure. The Sentinel program enforces on-chain that only wallets holding $NORTH tokens can initialize privacy rails. No tokens, no authority.

100M
TOTAL SUPPLY
2%
TRANSACTION TAX
80%
LIQUIDITY LOCKED
TOKEN STRUCTURE
Total supply: 100,000,000 $NORTH. Mint authority: REVOKED. Metadata: FROZEN. Contract: IMMUTABLE. These are permanent, verifiable on-chain properties. The token cannot be inflated, renamed, or modified.
🔥
DEFLATIONARY MODEL
2% tax on transactions (1% treasury, 1% operations). Progressive burn: 25% of tax at $100k MC, 50% at $1M MC. 100% of protocol service fees are used for buyback and burn. Supply decreases over time.
$NORTH UTILITY FLOW
HOLD $NORTH unlocks RAIL AUTHORITY initialize_rail enables FULL PROTOCOL Vaults · Handshakes Deposits · Transfers Compliance Controls Protocol fees → Buyback → Burn → Increased scarcity

Allocation: 15% architect allocation vested over 6-18 months. 80% of liquidity locked for 2 years. No pre-sale, no VC allocation. The token is designed for organic community growth with built-in deflationary pressure.

◆ ◆ ◆
SECTION 05

Roadmap
& Milestones

The full execution timeline with phase details and live status is available on the main site. Every milestone is backed by deployed code, not promises.

OVERALL PROGRESS 60%
✓ FOUNDATION ✓ ZK CRYPTO ◉ TOKEN AUDIT MAINNET
◆ ◆ ◆
SECTION 06

Security, Compliance
& ZK Cryptography

Sentinel is designed from the ground up with security and compliance as first-class concerns — not afterthoughts bolted on after deployment.

ON-CHAIN SECURITY MODEL

Authority verification: Every sensitive instruction verifies the caller is the rail authority via Anchor's has_one = authority constraint. Unauthorized calls return Unauthorized (Error 6001).

Token gating: Rail initialization requires the authority to hold $NORTH tokens, verified on-chain against the token account balance. This prevents spam and ensures only stakeholders operate rails.

State validation: 19 custom error codes enforce invariants — inactive rails reject operations, spent nullifiers cannot be reused, transfer nonces cannot be replayed, and withdrawn deposits cannot be double-claimed. Every edge case has an explicit error.

PDA determinism: All accounts use Program Derived Addresses with deterministic seeds and authority-linked constraints. No off-chain state is required. Account addresses can be independently derived and verified by any client.

ZERO-KNOWLEDGE PROOF PIPELINE (PHASE 03)
CLIENT SIDE 1. Secret + Amount 2. Generate ZK Proof 3. ElGamal Encrypt proof + ciphertext SOLANA ON-CHAIN 4. Verify Groth16 Proof 5. Check Nullifier 6. Update Vault State RESULT Amount: HIDDEN Sender: VERIFIED Proof: VALID ✓ The network validates integrity without knowing the content

Compliance architecture: Unlike other privacy protocols, Sentinel includes native compliance controls. Rails can be paused mid-investigation, sealed with an immutable audit hash for regulatory reporting, or permanently deactivated with a documented reason code. This makes Sentinel the first privacy protocol designed for institutional adoption.

🔐
GROTH16 ZK-SNARKS
Phase 03 integrates Groth16 circuits via Solana's alt_bn128 precompiles. Proofs verify that a commitment is valid and the amount is correct — without revealing either value.
🔑
ELGAMAL ENCRYPTION
Vault balances are encrypted with ElGamal public keys. Only the vault owner holds the secret key to decrypt. Homomorphic properties allow balance updates without decryption.
⚖️
AUDIT SEALS
The seal_rail instruction permanently writes a 32-byte audit hash to the rail. This hash can reference an off-chain audit report, creating an immutable compliance trail.
🛡
19 ERROR CODES
Every failure mode is explicitly handled: RailInactive, NullifierAlreadyUsed, AlreadyWithdrawn, InsufficientVaultBalance, InvalidProofLength, and 14 more. No silent failures.

Note: This litepaper reflects the current deployed architecture and its security direction. Groth16 expansion remains an active roadmap track; deployed controls already enforce deterministic authority, replay resistance, and auditable operational safeguards. $NORTH tokens are not securities and carry no guarantee of value. Always do your own research.

Every line of code is open source. Verify it yourself.

VIEW SOURCE CODE
Ready to Enter
the Grey Space?
The protocol is live on devnet. The cockpit is open. The silence awaits.