{"id":"nillion","title":"Nillion","content":"**Nillion** is a decentralized network designed for privacy-preserving computation and data management. It functions as a \"blind computer,\" enabling computations directly on encrypted data using a combination of cryptographic technologies, with an architecture that separates network coordination from secure computation. [\\[1\\]](#cite-id-dG0ptGGFo4)\n\n# Overview\n\nNillion is a decentralized computing network designed to store and process encrypted data without exposing it to operators or application backends. It functions as a “blind computer,” enabling computations directly on encrypted data using cryptographic primitives such as secure multi-party computation, homomorphic encryption, and trusted execution environments. This model eliminates the need to trust intermediaries by providing mathematical guarantees of data privacy.\n\nThe Nillion Network consists of specialized [nodes](https://iq.wiki/wiki/node) that perform distinct privacy functions. nilCC [nodes](https://iq.wiki/wiki/node) handle private computation within secure environments, nilDB [nodes](https://iq.wiki/wiki/node) manage encrypted and distributed data storage across multiple nodes, and nilAI [nodes](https://iq.wiki/wiki/node) execute private AI inferences without decrypting user data. Together, these [nodes](https://iq.wiki/wiki/node) enable secure data processing and storage without revealing the underlying information.\n\nTo simplify development, Nillion provides tools that abstract cryptographic complexity through APIs and SDKs. These tools enable developers to deploy privacy-preserving applications, manage encrypted storage, and integrate private AI capabilities without modifying their existing code. The technology supports privacy-focused use cases across fields such as healthcare, AI research, finance, and public policy, where collaboration on sensitive data requires maintaining strict confidentiality. [\\[2\\]](#cite-id-kp8UzGuPea) [\\[3\\]](#cite-id-KF2zgdOwVY)\n\n# Technology\n\n## Blind Modules\n\nBlind Modules are the main computational units within the Nillion Network, designed to perform secure data storage and processing. They enable encrypted operations through specialized APIs and SDKs, allowing developers and users to interact with privacy-preserving infrastructure without direct exposure to underlying data. Each module supports different aspects of computation, storage, and AI within the network.\n\n* **nilCC** serves as Nillion’s confidential computing platform, enabling containerized applications to run securely within trusted execution environments (TEEs). It isolates workloads, verifies their execution through cryptographic attestation, and supports deployment through a RESTful API. Developers can submit standard Docker Compose files, which the system converts into verifiable private computations without requiring code changes.\n* **nilDB** is a secure NoSQL database module that stores data in encrypted or decentralized form using cryptographic primitives such as symmetric encryption, homomorphic encryption, or multi-party computation. It provides API access for creating, retrieving, and querying data, with encryption handled client-side via the blindfold library.\n* **nilAI** operates as Nillion’s private AI module, running large language models within TEEs. It allows users to perform AI inference on encrypted data, ensuring that neither the model nor the operator can view the unencrypted input or output. Access is provided through a RESTful API that supports secure communication with the underlying AI models. [\\[4\\]](#cite-id-dLIOHowY16) [\\[8\\]](#cite-id-6LtrwRDjxy)\n\n# Architecture\n\nThe Nillion Network architecture is designed to enable privacy-enhancing technologies (PETs) for applications that require secure data storage and computation. It consists of two core components: the nilChain and the Petnet, which work together to coordinate payments, incentivize participation, and support privacy-preserving workflows. [\\[5\\]](#cite-id-zeF8oQkDvw)\n\n## nilChain\n\nThe nilChain serves as the Coordination Layer of the Nillion Network, overseeing essential network operations, including rewards distribution, payment processing, [crypto](https://iq.wiki/wiki/cryptocurrency)-economic security, and cluster coordination. Rather than executing storage or computation tasks directly, it manages and settles payments for these activities across the network, ensuring efficient resource allocation and fair compensation for participating nodes.\n\nDeveloped using the Cosmos SDK, nilChain leverages the Inter-Blockchain Communication (IBC) protocol to enable interoperability with other blockchain ecosystems. Despite its technical sophistication, nilChain does not currently support [smart contract](https://iq.wiki/wiki/smart-contract) execution, as its primary purpose is to maintain the backbone for Nillion’s storage and computation layers. This separation of responsibilities helps optimize performance and security for privacy-preserving operations.\n\nThe Coordination Layer is designed to be accessible through wallets such as Keplr and Leap, allowing users and developers to interact directly with the network. Applications built on external or partner [blockchains](https://iq.wiki/wiki/blockchain) can also integrate with nilChain, abstracting these processes for end users. [\\[3\\]](#cite-id-KF2zgdOwVY) [\\[5\\]](#cite-id-zeF8oQkDvw)\n\n## Petnet\n\nPetnet, also known as the Orchestration Layer, is designed to bring together cryptographic primitives such as Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and [Zero-Knowledge Proofs (ZKPs)](https://iq.wiki/wiki/zero-knowledge-proofs-zkps) to enable secure, privacy-preserving computation. It operates through two core components: the compiler and the computing network. The compiler simplifies the use of Privacy-Enhancing Technologies (PETs) by offering multiple abstraction levels, while the computing network handles encrypted data and executes computations without exposing sensitive information.\n\nWithin the Nillion Network, this system is implemented through the Nada language compiler and the nilVM, both of which are being developed to support four abstraction levels. At the most basic level, each PET protocol functions independently within its own Blind Module, with no unified interface or orchestration. Developers interact through APIs to perform specific tasks, but integration or customization is limited. As development progresses, SDKs begin integrating various Blind Modules, giving developers access to multiple PET protocols through a unified interface that simplifies usage without requiring deep cryptographic expertise.\n\nAt higher abstraction levels, Blind Modules evolve to support multiple PET protocols within a single module, enabling developers to balance performance and security as needed. These modules are then deployed across clusters—independent networks managed by the nilChain—each configured differently based on factors like [node](https://iq.wiki/wiki/node) count, hardware, reputation, and security thresholds. This flexibility enables developers to replicate and adapt modules for specific goals, such as cost efficiency, regulatory compliance, or enhanced security, forming the foundation for scalable, privacy-preserving computation across the Nillion ecosystem. [\\[5\\]](#cite-id-zeF8oQkDvw) [\\[7\\]](#cite-id-ksFoI80fpF)\n\n# NIL\n\n$NIL is the native token of the Nillion Network, designed to support its security, governance, and operational framework. It facilitates coordination across the network, enabling transactions, resource access, and payment for usage within the Coordination Layer. The token is also used to access Nillion’s privacy-preserving storage and computation services, allowing developers and users to perform blind computations and encrypted data operations. In addition, $NIL supports network integrity through staking, where tokenholders and validators commit tokens to secure computations and validate activity across the network. Governance within Nillion is decentralized, with $NIL tokenholders able to propose and vote on key decisions, including protocol upgrades, parameter changes, and the allocation of community resources. This structure aligns the token’s utility with the network’s long-term development and decision-making processes. [\\[6\\]](#cite-id-2L1sAMF4Fy)\n\n## Tokenomics\n\nNIL has a total supply of 1B tokens and has the following allocation: [\\[6\\]](#cite-id-2L1sAMF4Fy)\n\n* **Ecosystem and R\\&D**: 29%\n* **Early Backers**: 21%\n* **Core Contributors**: 20%\n* **Community**: 20%\n* **Protocol Development**: 10%\n\n# Partnerships\n\n* [NEAR](https://iq.wiki/wiki/near-protocol) \n* [Aptos](https://iq.wiki/wiki/aptos)\n* [Arbitrum](https://iq.wiki/wiki/arbitrum)\n* Ritual\n* Mizu\n* Nesa\n* [CapX](https://iq.wiki/wiki/capx-ai)\n* Kayra\n* Coasys\n* Salt\n* Crush\n* [Virtuals](https://iq.wiki/wiki/virtuals-protocol)\n* [Flux](https://iq.wiki/wiki/flux)\n* Interstellar\n* SoarChain\n* [io.net](https://iq.wiki/wiki/ionet)\n* [Coinbase](https://iq.wiki/wiki/coinbase)\n* [ElizaOS](https://iq.wiki/wiki/eliza-ai)","summary":"Nillion is a decentralized \"blind computer\" network that enables privacy-preserving computation on encrypted data using technologies like Multi-Party Computation (MPC).","images":[{"id":"QmaxwmTHwD4XkF1sb6wJyWDRzXFBcDQYBm4vK4wtKqYa4E","type":"image/jpeg, image/png"}],"categories":[{"id":"organizations","title":"organizations"}],"tags":[{"id":"Protocols"},{"id":"Blockchains"},{"id":"AI"},{"id":"Developers"},{"id":"Organizations"}],"media":[{"id":"QmNgV1reY3ew4DTWLS9HDtiYXJv7UxYkVRFFJHNhGPSqXE","type":"GALLERY","source":"IPFS_IMG"}],"metadata":[{"id":"references","value":"[\n  {\n    \"id\": \"dG0ptGGFo4\",\n    \"url\": \"https://nillion.com/\",\n    \"description\": \"Nillion official website\",\n    \"timestamp\": 1761156376566\n  },\n  {\n    \"id\": \"kp8UzGuPea\",\n    \"url\": \"https://docs.nillion.com/learn/what-is-nillion\",\n    \"description\": \"What is Nillion?\",\n    \"timestamp\": 1761156376566\n  },\n  {\n    \"id\": \"KF2zgdOwVY\",\n    \"url\": \"https://messari.io/report/understanding-nillion-a-comprehensive-overview\",\n    \"description\": \"Messari Report: Understanding Nillion\",\n    \"timestamp\": 1761156376566\n  },\n  {\n    \"id\": \"dLIOHowY16\",\n    \"url\": \"https://docs.nillion.com/learn/blind-modules\",\n    \"description\": \"Nillion Docs: Blind Modules\",\n    \"timestamp\": 1761156376566\n  },\n  {\n    \"id\": \"zeF8oQkDvw\",\n    \"url\": \"https://docs.nillion.com/articles/nillion-network-architecture\",\n    \"description\": \"Nillion Network Architecture\",\n    \"timestamp\": 1761156376566\n  },\n  {\n    \"id\": \"2L1sAMF4Fy\",\n    \"url\": \"https://nillion.com/news/blind-compute-needs-its-first-champion/\",\n    \"description\": \"Nillion News: NIL Token Launch\",\n    \"timestamp\": 1761156376566\n  },\n  {\n    \"id\": \"ksFoI80fpF\",\n    \"url\": \"https://docs.nillion.com/learn/architecture\",\n    \"description\": \"Nillion Docs: Architecture\",\n    \"timestamp\": 1761156376566\n  },\n  {\n    \"id\": \"6LtrwRDjxy\",\n    \"url\": \"https://docs.nillion.com/articles/nildb-encryption\",\n    \"description\": \"Understanding nilDB Encryption\",\n    \"timestamp\": 1761156376566\n  },\n  {\n    \"id\": \"event-conceptual-origins-link\",\n    \"description\": \"Event link\",\n    \"url\": \"https://docs.nillion.com/articles/nillion-network-architecture\",\n    \"timestamp\": 1761156376776\n  },\n  {\n    \"id\": \"event-$nil-token-launch-and-mainnet-genesis-link\",\n    \"description\": \"Event link\",\n    \"url\": \"https://nillion.com/news/blind-compute-needs-its-first-champion/\",\n    \"timestamp\": 1761156376776\n  }\n]"},{"id":"website","value":"https://nillion.com/"},{"id":"references","value":"https://docs.nillion.com/learn/what-is-nillion"},{"id":"references","value":"https://docs.nillion.com/learn/blind-modules"},{"id":"references","value":"https://docs.nillion.com/learn/architecture"},{"id":"references","value":"https://messari.io/report/understanding-nillion-a-comprehensive-overview"},{"id":"website","value":"https://www.nillion.com/"},{"id":"twitter_profile","value":"https://twitter.com/nillionnetwork"},{"id":"reddit_profile","value":"https://reddit.com/r/Nillion"},{"id":"github_profile","value":"https://github.com/NillionNetwork/networks"},{"id":"discord_profile","value":"https://discord.com/invite/nillionnetwork"},{"id":"telegram_profile","value":"https://t.me/nillionnetwork"},{"id":"contract_url","value":"https://mintscan.io/nillion"},{"id":"coinmarketcap_url","value":"https://coinmarketcap.com/currencies/nillion/"},{"id":"coingecko_profile","value":"https://www.coingecko.com/en/coins/nillion"},{"id":"previous_cid","value":"\"https://ipfs.everipedia.org/ipfs/QmbCFv5gafVGMTHdV4u1Wmxq6Px7TQ7aDzfYqqoMPSL34y\""},{"id":"commit-message","value":"\"docs: Refactor Nillion article for clarity, update tech details and expand partnerships.\""},{"id":"previous_cid","value":"QmbCFv5gafVGMTHdV4u1Wmxq6Px7TQ7aDzfYqqoMPSL34y"}],"events":[{"id":"88f04d69-56ea-46b5-b50c-98ebf8e3be4a","date":"2017-01","title":"Conceptual Origins","type":"CREATED","description":"The architectural philosophy of Nillion is based on a vision outlined in a 2017 academic paper by some of its team members.","link":"https://docs.nillion.com/articles/nillion-network-architecture","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null},{"id":"e2078528-80df-4a95-91bb-6a7731f1144d","date":"2025-03","title":"$NIL Token Launch and Mainnet Genesis","type":"DEFAULT","description":"Nillion announced the launch of its native token, $NIL, coinciding with the mainnet genesis of the nilChain and the alpha mainnet of its Blind Modules.","link":"https://nillion.com/news/blind-compute-needs-its-first-champion/","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null}],"user":{"id":"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889"},"author":{"id":"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889"},"operator":{"id":"0xacb6c5AD52b8f605299B0d774CE97F26e3DB80c2"},"language":"en","version":1,"linkedWikis":{"blockchains":["cosmos","near-protocol","aptos","arbitrum"],"founders":["alex-page","miguel-de-vega","andrew-masanto"],"speakers":[]}}