Ciphernodes operate the cryptographic infrastructure that enables confidential coordination on the Interfold.
When a computation is requested, a committee of ciphernodes is selected to generate a shared threshold key. Data providers encrypt their inputs to this key, ensuring no single party can access the underlying data. Once computation completes, ciphernodes collectively produce decryption shares that reveal only the final result.
Because no node ever holds the full key or sees plaintext inputs, a diverse and independently operated set of ciphernodes is essential to the network’s security.
We are currently onboarding early operator interest ahead of broader network access.
If you're interested in running a ciphernode, apply below.