Resources
Learn. Build. Go Deeper.
Documentation, research, tutorials, and community — everything you need to understand and build with verifiable privacy infrastructure.
Jump to what you need.
For Developers
For Decision Makers
For Everyone
Technical reference and guides.
Sapphire Documentation
Complete guide to building confidential smart contracts on the EVM-compatible runtime. Covers setup, development patterns, privacy primitives, and deployment.
ROFL Documentation
Guide to building and deploying verifiable off-chain applications. Covers containerization, attestation, Sapphire integration, and production deployment.
API Reference
Complete API documentation for all Oasis services and endpoints.
Guides & Tutorials
Beginner Guides
- Deploying Your First Confidential Contract
- Building a Private Token
- Setting Up a Development Environment
- Connecting a Frontend to Sapphire
Advanced Guides
- Designing for Encrypted State
- Cross-Contract Privacy Patterns
- ROFL + Sapphire Integration
- Production Security Hardening
Migration Guides
- Migrating from Ethereum to Sapphire
- Adding Privacy to Existing Contracts
- Porting Backend Services to ROFL
Technical depth and academic foundations.
Oasis Network Whitepaper
Comprehensive technical overview of the network architecture, consensus mechanism, and confidential computing approach.
Download PDF →
Sapphire Technical Specification
Detailed specification of the confidential EVM implementation, encryption model, and privacy guarantees.
Download PDF →
TEE Security Model
Analysis of Trusted Execution Environment security properties, threat model, and defense-in-depth approach.
Download PDF →
Security Audits
Third-party security audit reports for Oasis infrastructure.
View Audits →
How teams are building with Oasis.
Talos: Trustless AI Agents
How Talos built autonomous trading agents with verifiable execution, trustless key management, and enforceable policy constraints.
Solution: ROFL + KMS + on-chain attestation
Result: Fully verifiable agent behavior
MEV-Resistant Trading
How protocols eliminated front-running and sandwich attacks with encrypted order flow and confidential matching.
Solution: Sapphire encrypted state and calldata
Result: Fair execution without information leakage
Compliant Asset Tokenization
How institutions built institutional-grade tokenized securities with confidentiality and regulatory compliance.
Solution: Selective disclosure with policy enforcement
Result: Institutional adoption with regulator approval
Common questions, quick answers.
What is Oasis?
Oasis is a verifiable privacy infrastructure that enables confidential execution on-chain (Sapphire) and off-chain (ROFL) with continuous attestation and trustless key management.
How is Oasis different from other privacy solutions?
Oasis provides encrypted shared state (unlike ZK), real-world performance (unlike FHE), and verifiable execution (unlike centralized solutions). Privacy with proof, not just privacy.
Is Sapphire EVM compatible?
Yes. Sapphire is fully EVM compatible. You can use Solidity, Hardhat, Foundry, MetaMask, and standard Ethereum tooling.
What languages does ROFL support?
ROFL supports any language that runs in a container. Rust, Go, Python, JavaScript, C++ — if you can Dockerize it, you can run it.
How do I report a security issue?
Use the bug bounty program for responsible disclosure. Critical issues can be reported directly to the security team.
Can't find what you need?
Reach out to our team. We're here to help you build.