Core Architectural Principles

We first introduce the core principle/phrases in this page.

Architecture Overview

+--------------------------+
|     Solana / SVM Chain   |
+--------------------------+
            ^
            | Attestation, Proofs
            v
+--------------------------+
|    Nada Verification     |  <-- On-chain program verifying TEE proofs
+--------------------------+
            ^
            | Execution Receipts
            v
+--------------------------+
|      TEE Execution       |  <-- Agents run inside SGX/Nitro/SEV
|  Nada Agent Runtime      |
+--------------------------+
            ^
            | Input, Prompts, Tasks
            v
+--------------------------+
|        User / dApp       |
+--------------------------+

1. Confidentiality

Inputs, execution state, and outputs of agents remain private inside TEEs.

2. Verifiability

SVM programs can verify:

  • TEE vendor attestation signatures

  • enclave measurement (hash of binary)

  • enclave-bound public key

  • execution provenance (context & attention proofs)

  • output signatures

3. Deterministic Verification, Non-Deterministic Execution

The TEE produces nondeterministic computation; the blockchain verifies a deterministic proof.

4. Compatibility

No changes required to:

  • Solana runtime

  • Solana clients

  • Solana development tools

  • existing SVM programs

Nada functions as a modular confidentiality layer.

Last updated