Private credit infrastructure

Underwrite borrowers without putting their financial lives on-chain.

Credora encrypts borrower inputs in the browser, computes a score with confidential arithmetic, and lets lenders operate on a narrow decision surface instead of exposed personal data.

Protocol at a glance

010

Published borrower fields. Income, assets, and liabilities stay encrypted end to end.

021 signal

Confidential underwriting for lenders. Pools can work with eligibility and rate data without viewing raw profiles.

03300 - 850

Score band. The engine maps confidential arithmetic into a familiar credit range.

04Sepolia

Deployment network. Designed for fhEVM-style experimentation and lending workflow demos.

How it works

A lending product shaped around confidentiality from the first input.

01

Borrower data is encrypted before submission

Credora treats the browser as the privacy boundary. Values are encrypted locally, then signed and sent as ciphertext-backed handles.

02

The score is computed directly on encrypted values

Income, assets, and liabilities are combined with homomorphic operations so the protocol never needs to decrypt the working data.

03

Loan decisions expose only the minimum useful signal

Lending logic can consume tier, eligibility, and pricing outputs while the borrower retains control over the full score reveal.

Workflow

The borrower path stays readable even though the important arithmetic remains hidden.

01
Capture the profile privately

The borrower fills in financial information once, inside a wallet-connected session, and the app converts those fields into encrypted handles.

02
Run confidential underwriting on-chain

The credit engine performs arithmetic and threshold checks on ciphertext so the protocol can derive a score without ever touching plaintext values.

03
Reveal only what the next step needs

Borrowers can request private decryption for inspection, while the lending pool can move on a narrow decision output instead of a full financial dossier.

What lenders see

Pools operate on outputs, not inputs.

Lenders never access borrower financials. They receive a tier, a rate, and a loan ceiling, enough to price risk and allocate capital. Nothing more.

  • Borrower tier eligibility is resolved without exposing the underlying score.
  • Pricing terms and loan ceilings are derived from encrypted threshold checks.
  • Every underwriting decision is recorded as a verifiable on-chain transaction.
  • No plaintext income, asset, or liability data is disclosed at any point.

Start the flow

Move through the full private credit path from encrypted intake to loan access without switching visual context or disclosure rules.

Inspect lending terms