Roadmap
PIR schemes tailored to the Ethereum hot state and archival history, allowing users to read chain data from remote servers without revealing what is being queried. The sharded approach optimizes for different data types, contexts of usage, and tolerance to latency.
Now
Next
Later
Impact
- Users can read state data without revealing what they queried, all while expressing those queries through the same Ethereum RPC standard.
- Hardens the privacy guarantees provided by other measures (shielding, network-level privacy).
- Provide developers with a unified, stable PIR interface and query/response/preprocessing standards.
Provably L1-equivalent execution-layer node running against a Unified Binary Tree (EIP-7864). PIR servers, wallets, and light clients can begin consuming binary-based state today, ahead of EIP-7864 inclusion in protocol, while relying on equivalence proofs for data validity.
Now
Next
Impact
- Unlocks binary-trie benefits for the PIR usecase ahead of EIP-7864 protocol inclusion.
- Wallets and light clients can begin upgrading to the binary format all while trustless verifying its equivalence to on-chain MPT state.
- Contributes to EIP-7864 testing and benchmarking ahead of its inclusion fork.
Pluggable abstraction over anonymization networks (onion nets, mixnets, or any other). The edge — in-browser wallets, SDKs, light clients — can swap networks without app-layer changes. The architecture and access/validation standard may be extended to accessing P2P networks generally.
Now
Next
Exploratory
Impact
- Wallets can swap between anonymity networks (Tor, mixnets, others) without code changes.
- Prevents lock-in and switching costs.
- Prevents ISP traffic linkage to Ethereum activity.
- Removes the dependency on centralized RPC providers.
Arti — Tor's official Rust client — compiled to WebAssembly. Anonymized RPC from wallets, frontends, and dApps, running entirely in the browser.
Now
tor-js; npm install tor-js wires Arti-backed fetch() into any browser or Node.js project.Next
Later
Impact
- Users gain onion routing even in constrained environments like browser wallets and frontends — no extensions, plugins, or native binaries required.
- Servers see queries but not the IPs they came from, breaking the link between Ethereum activity and identity.
- Adoption is one npm install away — TorJS slots into existing fetch()-based code with minimal integration work.
Delivered in Q1 2026
TLDR: correctness-focused reference specs of PIR schemes [1] [2] which anchor subsequent production-grade implementation, a PIR system design for a path towards practical PIR for the entire Ethereum state, and a browser-embeddable [1] [2] [3] Tor client unlocking onion routing Ethereum user traffic (RPC or otherwise) without configurations or installation.
- Embedded Arti in the browser —
Tor's official Rust client
compiled to WebAssembly and exposed through a
fetch()-compatible API, with IndexedDB persistence, cross-tab locking, and a Brotli-compressed ~3 MB bootstrap bundle that replaces fetching thousands of micro-descriptors. (Technical post, integration docs, fork.) Impact: wallets, frontends, and dApps can route traffic through Tor from inside the browser — no extension, configurations, installations, or system-wide native binary. - Sharded PIR design for the Ethereum state — a blueprint for serving hot state, immutable logs, and archival history through different cryptographic engines, with a sidecar that absorbs real-time updates while the main engine serves stable snapshots. (ethresear.ch post.) Impact: sharding creates a path towards practical PIR for the entire Ethereum hot and archival state; creates a unified interface and shared assumptions about data slicing and update flow that anyone can design towards, reducing friction of integration/upgrading/swapping of schemes.
- Specs and reference impl of select PIR schemes — readable, executable specs for Plinko, RMS24, and VIA (with its VIA-B and VIA-CB variants), prioritizing correctness over performance so they can anchor production implementations downstream. Impact: accelerating implementations of production-grade schemes; validating performance outlook and surfacing bottlenecks (e.g. the intractable iPRF step in Plinko) beyond what the papers present in asymptotic terms.