Skip to content
Whisper-Vault

Whisper-Vault

Anti-Corruption Decentralized Block-Chain App

Created on 18th January 2026

Whisper-Vault

Whisper-Vault

Anti-Corruption Decentralized Block-Chain App

The problem Whisper-Vault solves

The problem it solves :
Modern whistleblowing systems force an impossible trade-off between trust and anonymity.
Fully anonymous reports are often dismissed as unreliable, fake, or malicious.
Verified reports expose whistleblowers to retaliation, job loss, legal action, or worse.
Even so-called “anonymous” platforms usually require trust in administrators, servers, or governments not to reveal identities.
As a result, many cases of corruption, abuse, and wrongdoing go unreported — not because people don’t care, but because the personal risk is simply too high.

How WhisperVault fixes this
WhisperVault eliminates the identity vs. anonymity trade-off.
It enables insiders to submit reports and evidence while providing cryptographic proof that they are authorized members of an organization — without revealing who they are, even to system administrators.

Using zero-knowledge proofs
With zero-knowledge cryptography, reporters can:
Prove “I am a legitimate insider”
Without revealing which insider they are
And without trusting any central authority to protect their identity
The result is whistleblowing that is both verifiable and truly anonymous.

Challenges we ran into

Challenges I ran into

  1. Zero-knowledge proofs in the browser

Generating ZK proofs client-side was one of the biggest challenges. Proof generation is computationally heavy, slow on low-end devices, and difficult to debug when something fails silently.

How I solved it:
Instead of writing custom circuits from scratch, I used Semaphore, a battle-tested ZK library that abstracts away most of the cryptographic complexity. I optimized the UX by clearly showing loading states during proof generation and keeping proofs small enough to be practical for a demo (~5–10 seconds).

  1. Proving authorization without leaking identity

A core challenge was ensuring that users could prove they were legitimate insiders without exposing wallet addresses, metadata, or allowing admins to deanonymize submissions.

How I solved it:
I designed the smart contract so it never stores user addresses or personal data. It only stores a Merkle root of identity commitments and verifies zero-knowledge proofs against it. This guarantees that verification happens purely through math, not trust.

  1. Secure file storage without central servers

Storing evidence directly on-chain was impossible due to cost and size limits, but using a traditional server would undermine anonymity and trust.

How I solved it:
I used IPFS for decentralized storage and only stored the content hash on-chain. This ensures evidence is tamper-resistant, verifiable, and not controlled by any single party.

  1. Balancing privacy with usability

Privacy-preserving systems are often confusing for non-technical users. Wallet connections, proof generation, and decentralized storage can easily overwhelm users.

How I solved it:
I focused on UX simplicity: a familiar upload flow, clear explanations, and minimal crypto jargon. All cryptographic steps happen behind a single “Generate Proof & Submit” action.

  1. Designing a system with zero trust in admins

It was challenging to ensure that even platform administrators could not identify or track whistleblowers.

How I solved it:
The system architecture assumes admins are not trusted. No logs, emails, IPs, or addresses are stored. Identity verification is enforced entirely by cryptographic proofs and smart contracts, not permissions or databases.

Tracks Applied (1)

Ethereum Track

We use Polygon Amoy Blockchain which is a layer 2 block chain built on Ethereum Blockchain.
ETHIndia

ETHIndia

Discussion

Builders also viewed

See more projects on Devfolio