Published borrower fields. Income, assets, and liabilities stay encrypted end to end.
Private credit infrastructure
Underwrite borrowers without putting their financial lives on-chain.
Credora encrypts borrower inputs in the browser, computes a score with confidential arithmetic, and lets lenders operate on a narrow decision surface instead of exposed personal data.
Protocol at a glance
Confidential underwriting for lenders. Pools can work with eligibility and rate data without viewing raw profiles.
Score band. The engine maps confidential arithmetic into a familiar credit range.
Deployment network. Designed for fhEVM-style experimentation and lending workflow demos.
How it works
A lending product shaped around confidentiality from the first input.
Borrower data is encrypted before submission
Credora treats the browser as the privacy boundary. Values are encrypted locally, then signed and sent as ciphertext-backed handles.
The score is computed directly on encrypted values
Income, assets, and liabilities are combined with homomorphic operations so the protocol never needs to decrypt the working data.
Loan decisions expose only the minimum useful signal
Lending logic can consume tier, eligibility, and pricing outputs while the borrower retains control over the full score reveal.
Workflow
The borrower path stays readable even though the important arithmetic remains hidden.
The borrower fills in financial information once, inside a wallet-connected session, and the app converts those fields into encrypted handles.
The credit engine performs arithmetic and threshold checks on ciphertext so the protocol can derive a score without ever touching plaintext values.
Borrowers can request private decryption for inspection, while the lending pool can move on a narrow decision output instead of a full financial dossier.
What lenders see
Pools operate on outputs, not inputs.
Lenders never access borrower financials. They receive a tier, a rate, and a loan ceiling, enough to price risk and allocate capital. Nothing more.
- Borrower tier eligibility is resolved without exposing the underlying score.
- Pricing terms and loan ceilings are derived from encrypted threshold checks.
- Every underwriting decision is recorded as a verifiable on-chain transaction.
- No plaintext income, asset, or liability data is disclosed at any point.
Start the flow