Technical Paper

Legba Private Wallet: A Private Execution Layer for Digital Assets

A privacy-first crypto wallet designed for adversarial environments where observation is assumed. Privacy is structural, not configurable.

January 202620 min readDownload PDF

Problem Statement

Cryptocurrency systems are transparent by default. Wallet software leaks metadata through RPC providers, browsers expose persistent identifiers, and infrastructure providers correlate timing and volume long before a transaction reaches the chain.

Most privacy tools address only a single layer. Consequently, users obscure on-chain data while remaining identifiable through network or application-level correlation. Privacy that depends on user discipline fails under realistic conditions.

Legba Private Wallet is designed for adversarial environments where observation is assumed.

Design Objective

The objective of the Legba Private Wallet is to prevent reliable linkage between a user's identity and their digital asset activity. This requires suppressing attribution at the point of execution, not retroactively at settlement.

Privacy is structural, not configurable.

Strategic Definition: Execution vs. Speculation

Legba is strictly an execution environment, not a portfolio management tool. It is designed for the secure, private movement and interaction of capital. It is not designed for price discovery, trade optimization, or market timing.

Threat Model

The system assumes adversaries with access to:

  • Blockchain analytics and clustering tools
  • RPC request logs and timing correlation
  • Browser fingerprinting techniques
  • Behavioral data collected by dApps and infrastructure providers

The system does not attempt to defend against endpoint compromise or physical coercion. It prevents network- and application-level attribution under normal operation.

System Constraints and Non-Negotiable Principles

The following constraints are architectural invariants. Any feature or integration that violates one is out of scope.

  • No public execution paths
  • No optional privacy modes
  • No persistent execution identity
  • No custody or intermediation of funds
  • No protocol changes
  • No new chains introduced by Legba
  • No aggregation or pooling
  • No persistent identifiers or behavioral telemetry designed to identify users

Privacy cannot be disabled, downgraded, or misconfigured.

Architecture Overview

The Legba Private Wallet is composed of three core components and a strict asset-role model.

Shielded Transfers (Zcash)

Zcash provides mature shielded pools using zero-knowledge proofs. The wallet supports shielded addresses only. Transparent addresses are not exposed to the user interface. Zcash functions as a privacy rail, not a core asset.

Private Smart Contract Execution (Ethereum)

Ethereum interaction is performed exclusively through Railgun.

  • Public Ethereum addresses are never exposed
  • Public contract approvals are not supported
  • Execution occurs through zero-knowledge paths

Public rails are used for ingress and egress only. Execution and interaction are performed exclusively through private paths.

Isolated Execution Runtime

All wallet logic, dApp interaction, and network communication occur within an isolated execution environment. This environment:

  • Suppresses browser fingerprinting
  • Suppresses network identifiers
  • Prevents persistent execution state

Each session operates with a fresh execution identity destroyed at termination. Wallet state and cryptographic keys persist independently of execution identity and are never exposed as execution, network, or application identifiers.

Asset Role Separation

Assets are not treated symmetrically.

  • BTC and Stablecoins are Capital Anchors
  • ZEC and Railgun are Privacy Rails
  • ETH and SOL are Execution Surfaces

Legba is the boundary between identity and activity.

Split Execution Model

Legba Private Wallet is built on a split execution model. Application execution occurs inside the isolated runtime. Cryptographic keys remain local to the user.

The runtime performs routing, dApp interaction, session isolation, and network suppression. It requests transaction signatures but cannot generate them. The system cannot initiate transactions autonomously.

Bitcoin Integration

Bitcoin as Capital Anchor

Bitcoin is treated strictly as a store of value and a capital ingress and egress asset. It is not an execution environment and is never used interactively.

BTC Ingress

Users fund the system from a standard BTC UTXO.

  • Each ingress UTXO is single-use.
  • Bitcoin is only observed at ingress and egress and is never used interactively.

Immediately upon ingress, BTC crosses into the private environment through user-initiated, external conversion paths selected and executed outside of Legba. Legba does not intermediate trades, quote prices, or route orders. The original UTXO is burned from behavioral relevance.

BTC Inside the Private Environment

Inside Legba, Bitcoin exists only as value exposure. There is no addressable Bitcoin wallet, no interactive BTC execution, and no public RPC interaction.

BTC Egress

When exiting:

  • BTC exits through a fresh UTXO.
  • Route Sanitization is applied.
  • No prior execution behavior is observable at settlement.

Bitcoin never touches dApps, user-side RPCs, or browser execution paths. Bitcoin is only observed at ingress and egress.

Stablecoin Integration

Stablecoins as Execution Fuel

Stablecoins are treated as transient execution liquidity. They are temporary, mobile, and stateless inside the system. They are not accounts, balances, or financial products.

Shielded Stablecoin Handling

All stablecoins entering the system:

  • Immediately enter a private balance
  • Never appear as public ERC-20 transfers
  • Never require public approvals
  • Never persist as visible addresses

No Stablecoin Accounts

There is no stablecoin wallet address, balance history, or public representation. Stablecoins exist only as spendable private liquidity.

Permitted Uses

Stablecoins may be used for Ethereum dApp execution, Solana execution funding, temporary hedging, and capital rotation. They are not parked long-term, off-ramped by Legba, pooled, or intermediated.

Stablecoin Exit

Stablecoins exit directly or are converted externally by the user.

Solana Integration

Solana as Execution Surface

Solana is treated as a high-velocity execution target, not a resident chain. Legba does not expose public Solana addresses, persistent Solana accounts, or user-visible Solana wallets.

Isolated Solana Execution

All Solana interaction occurs inside the isolated execution runtime using ephemeral session identities destroyed after execution. Keys remain user-controlled and are never reused across sessions.

Funding Solana Execution

Solana execution is funded via private stablecoin conversion or private ETH to SOL paths. Fee funding for ephemeral execution identities is handled inside the isolated runtime in a manner that avoids reuse and minimizes correlation to the user's capital anchor. Users do not bring public Solana wallets into the system.

Risk Posture

Solana execution is disabled by default and explicitly activated.

Crossing the Boundary

The Reality of Off Ramps

There is no fully private fiat off ramp. Banks, exchanges, and payment networks operate under compliance regimes that require identity and reporting. Legba does not attempt to eliminate this boundary.

Exit Philosophy

Privacy is enforced structurally inside the system. Privacy degrades only at the user's chosen exit point. The counterparty sees a transaction. They do not see a user.

Route Sanitization

Before funds leave the private environment, they undergo Route Sanitization. Legba provides sanitization tooling, not automated settlement.

Route Sanitization leverages the native anonymity sets of the underlying privacy rails to disrupt transaction-graph linkage. Users retain agency over the specific timing and sizing of exits. Legba does not aggregate flows across users.

Exit Paths

Users may exit through multiple paths without Legba intermediating any of them:

  • Centralized exchanges
  • External transfers and spending
  • Crypto-native custody rotation

Compliance occurs at the counterparty.

Hole-Proofing Checklist

The system is considered compromised if any of the following occur:

  • A public chain observes the same externally visible address twice
  • A dApp sees a stable user fingerprint
  • A stablecoin balance persists across sessions
  • Solana RPC metadata leaks
  • Bitcoin UTXOs are reused
  • Users can opt out of privacy

The architecture is designed to prevent these conditions.

Scope Limitations

The wallet deliberately excludes features that introduce attribution risk, including fiat integration, public execution modes, and identity-linked services.

Manifesto

Most crypto wallets optimize for convenience. In doing so, they expose users to surveillance through layers outside the blockchain.

Legba treats visibility as the primary failure mode and removes it at the execution layer. This is not a privacy feature added to an existing wallet model. It is a private execution system designed for adversarial environments.

Legba is invisible by design.

Explore More Legba Resources

Learn more about browser-native isolation and how Legba protects your digital presence across all attack surfaces.