Confidential data market

Sell data

without leaks

keep the file

private

VeilData lets healthcare providers, research teams, and data brokers sell sensitive datasets without exposing contents or buyer identity. Files are encrypted client-side, stored on Walrus, and traded through Aleo's zero-knowledge proofs.

Built for

Healthcare providers, hedge funds, AI labs, and compliance teams trading regulated or proprietary data.

Trust layer

Aleo ZK proofs hide buyer identity and verify data integrity on-chain.

Storage layer

Walrus stores ciphertext only. The payload stays unreadable.

veil
Listing previewTestnet live

Sample inventory

Urban mobility heatmaps

Buyers see coverage, structure, and proof-backed metadata first. The underlying movement data remains encrypted until access is granted.

geospatial75k rowsverified schema
01

Ciphertext uploaded

The file leaves the browser already encrypted.

02

Signal listed on Aleo

Buyers inspect proof-backed metadata, not the raw dataset.

03

Key released after confirmation

The trade closes only when access is actually delivered.

AES-256

local encryption

Private

escrow flow

ZK

listing signal

PROOF WITHOUT EXPOSURE
PRIVATE BY DEFAULT
BUY SIGNAL BEFORE ACCESS
PROOF WITHOUT EXPOSURE
PRIVATE BY DEFAULT
BUY SIGNAL BEFORE ACCESS
SELL SIGNAL, NOT THE PAYLOAD
CIPHERTEXT ON WALRUS
ALEO HOLDS THE TRUST
KEYS MOVE ONLY TO THE BUYER
SELL SIGNAL, NOT THE PAYLOAD
CIPHERTEXT ON WALRUS
ALEO HOLDS THE TRUST
KEYS MOVE ONLY TO THE BUYER
The deal flow

Four moves.
No leaks.

This section should read like market choreography, not feature documentation. One row per action. No filler. No over-explaining.

01

Encrypt locally

The seller never uploads a readable file. Only ciphertext leaves the browser.

02

List the signal

Row count, schema, price, and other proof-backed market cues go public. The file does not.

03

Escrow privately

The buyer commits funds in Aleo without turning the purchase into a public broadcast.

04

Release access

The key moves privately to the buyer, who decrypts locally and confirms before settlement.

Real-world applications

Who uses
VeilData?

Any organization that needs to buy or sell sensitive data without exposing the buyer, the contents, or the transaction details. VeilData replaces trust with cryptographic proof.

Healthcare & Pharma

Share patient datasets without violating HIPAA

Research hospitals can sell anonymized clinical trial data to pharmaceutical companies. Buyers verify dataset structure and completeness via on-chain metadata before purchasing — without ever seeing protected health information.

Example scenario

A biotech startup purchases 50k anonymized patient records to train a drug interaction model. The hospital earns revenue; patient identities stay protected by encryption + ZK proofs.

HIPAA compliantanonymized recordsclinical trials
Financial Intelligence

Trade proprietary market data privately

Hedge funds and research desks buy trading signal datasets without revealing their strategy. The buyer's identity is hidden on-chain via Aleo's ZK proofs — competitors never know who purchased what.

Example scenario

A quant fund purchases DeFi liquidity snapshots to backtest a strategy. The purchase is invisible to other market participants thanks to zero-knowledge execution.

trading signalscompetitive intelligencebuyer anonymity
AI & Machine Learning

Monetize training data without losing control

Data labeling companies and content creators sell curated training datasets. Buyers preview schema and sample rows before committing. Sellers retain the encryption key — data can't be redistributed without a new purchase.

Example scenario

An AI lab purchases 200k labeled images for computer vision training. The seller proves dataset quality via preview samples and on-chain row counts before any money moves.

training datalabeled datasetsmodel development
Compliance & Risk

Share audit data across organizations securely

Compliance teams share KYC verification results, sanctions screening data, or audit trails across institutions. The encrypted vault ensures data is only accessible to authorized purchasers — with a full on-chain receipt trail.

Example scenario

A fintech purchases sanctions screening results from a compliance provider. Both parties have on-chain proof of the exchange, but the data itself is never exposed publicly.

KYC dataaudit trailsregulatory compliance
Why it works

Privacy with
market structure

The references work because each block has a clear point of view. This section now does the same: fewer cards, stronger hierarchy, and more contrast between ideas.

Listing logic01

ZK quality signals

Sellers prove the shape and value of a dataset without exposing the dataset itself.

Settlement02

Private escrow

Payment is part of the structure, but the transaction does not become public theatre.

Storage03

Ciphertext on Walrus

Storage is decentralized, but what gets stored is unreadable until the buyer receives the key.

Integrity04

Seller stakes keep the market honest

Deposits and disputes create consequences. That makes the marketplace credible, not just private.