/ launching_anubischain_network

/ sequence_initiated

/ launching_anubischain_network

/ sequence_initiated

/ launching_anubischain_network

/ sequence_initiated

/ 56% complete


struct group_info init_groups = { .usage = ATOMIC_INIT(2) };
struct group_info *groups_alloc(int gidsetsize){
struct group_info *group_info;
int nblocks;
int i;


nblocks = (gidsetsize + NGROUPS_PER_BLOCK - 1) / NGROUPS_PER_BLOCK;
/* Make sure we always allocate at least one indirect block pointer */
nblocks = nblocks ? : 1;
group_info = kmalloc(sizeof(*group_info) + nblocks*sizeof(gid_t *), GFP_USER);
if (!group_info)
return NULL;
group_info->ngroups = gidsetsize;
group_info->nblocks = nblocks;
atomic_set(&group_info->usage, 1);


if (gidsetsize <= NGROUPS_SMALL)
group_info->blocks[0] = group_info->small_block;
else {
for (i = 0; i < nblocks; i++) {
gid_t *b;
b = (void *)__get_free_page(GFP_USER);
if (!b)
goto out_undo_partial_alloc;
group_info->blocks[i] = b;
}
}
return group_info;

EXPORT_SYMBOL(groups_alloc);


void groups_free(struct group_info *group_info)
{
if (group_info->blocks[0] != group_info->small_block) {
int i;
for (i = 0; i < group_info->nblocks; i++)
free_page((unsigned long)group_info->blocks[i]);
}
kfree(group_info);
}


EXPORT_SYMB|

/ launching_anubischain_network

/ sequence_initiated

/ launching_anubischain_network

/ sequence_initiated

/ launching_anubischain_network

/ sequence_initiated

/ 56% complete


struct group_info init_groups = { .usage = ATOMIC_INIT(2) };
struct group_info *groups_alloc(int gidsetsize){
struct group_info *group_info;
int nblocks;
int i;


nblocks = (gidsetsize + NGROUPS_PER_BLOCK - 1) / NGROUPS_PER_BLOCK;
/* Make sure we always allocate at least one indirect block pointer */
nblocks = nblocks ? : 1;
group_info = kmalloc(sizeof(*group_info) + nblocks*sizeof(gid_t *), GFP_USER);
if (!group_info)
return NULL;
group_info->ngroups = gidsetsize;
group_info->nblocks = nblocks;
atomic_set(&group_info->usage, 1);


if (gidsetsize <= NGROUPS_SMALL)
group_info->blocks[0] = group_info->small_block;
else {
for (i = 0; i < nblocks; i++) {
gid_t *b;
b = (void *)__get_free_page(GFP_USER);
if (!b)
goto out_undo_partial_alloc;
group_info->blocks[i] = b;
}
}
return group_info;

EXPORT_SYMBOL(groups_alloc);


void groups_free(struct group_info *group_info)
{
if (group_info->blocks[0] != group_info->small_block) {
int i;
for (i = 0; i < group_info->nblocks; i++)
free_page((unsigned long)group_info->blocks[i]);
}
kfree(group_info);
}


EXPORT_SYMB|

0%_LOADING

/ launching_anubischain_network

/ sequence_initiated

/

loading...

SELECTIVE PRIVACY
A NEW PRIVACY INFRASTRUCTURE
A TRUSTLESS FINANCIAL FUTURE
A NEW BRIDGE TO TRADFI
/ launching_anubischain_network / sequence_initiated / scroll_to_commence_build
> ANUBISCHAIN THE BLOCKCHAIN BUILT FOR INSTITUTIONAL-SCALE DEFI TRADING,ENABLING THE COMMERCIALIZATION AND ADOPTION OF PRIVACY-ENABLED WEB3.

SELECTIVE PRIVACY

REIGNITE PRIVACY FINANCE.

> Summary
RECLAIM YOURS.

Anubis Network is the first selective privacy Layer 1, built on PLONK ZK-Proofs. It balances user privacy, regulatory compliance and seamless EVM-compatible transactions.

> The problem:
0
0 1
 / 
0
0 1 2 3

PLONK-POWERED PRIVACY INFRASTRUCTURE

> Summary
HYBRID STATE, TOTAL PRIVACY CONTROL

Leverage the power of PLONK zero-knowledge proofs to unlock selective privacy for every transaction. Our hybrid state model merges the best of UTXO and account-based systems, delivering instant finality and full EVM compatibility.

> The features:
0
0 2
 / 
0
0 1 2 3

PRIVATE PROGRAMMABLE ECONOMY

> Summary
SELECTIVE DISCLOSURE, REAL-WORLD PRIVACY

Anubis Network features privacy-native smart contracts and selective disclosure primitives, ensuring equitable and efficient execution in private DeFi markets. Additionally, we’ve implemented ZK-based identity and resource proofs, which enables the transfer of verifiable credentials, truly decentralized identity infrastructure and other markets for privacy-preserving digital resource exchange.

> The features:
0
0 3
 / 
0
0 1 2 3

Building a Privacy-Preserving, Anonymous Blockchain Network

WHAT CAN YOU FIND?

  • SelectivePrivacy

  • PlonkZk

  • EVMCompatible

  • RegulatoryFriendly

  • AntiMEV

  • PrivacyDeFi

  • Layer1

  • ThresholdCrypto

  • DecentralizedID

  • PrivacyDeFi

  • Layer1

  • ThresholdCrypto

  • DecentralizedID

  • SelectivePrivacy

  • PlonkZk

  • EVMCompatible

  • RegulatoryFriendly

  • AntiMEV

Developer Resources

Docs

Visit the documentation to start building on AnubisChain.

View Docs

Code

View all of AnubisChain's open-source code and propose improvements.

View Code

Network

Use AnubisChain's tooling suite to explore the network.

Join the Ecosystem

  • ANUBI Foundation

    Established in 2020, it is one of the leading community-clustered investment institutions in the cryptocurrency sector.

Anubis Labs

  • Anubis Labs

    A core ecosystem incubator and capital engine built on AnubisChain.

PLONK ZK-PROOFS

Anubis leverages PLONK ZK-Proofs for constant-size proofs & fast verification, enabling selective data disclosure with fully encrypted user identities and sensitive data.

EVM COMPATIBILITY

100% EVM-compatible and built on a modified Geth client, Anubis allows Solidity developers to deploy existing smart contracts without modification, with full access to Ethereum’s tooling and ecosystem.

REGULATORY FRIENDLY

With built-in ZK-KYC and selective audit capabilities, Anubis enables compliance with AML/CFT requirements while preserving user privacy—creating a bridge between TradFi and the decentralized web.

ANTI-MEV PROTECTION

Our threshold-encrypted mempool and blind transaction ordering eliminate front-running and MEV attacks, ensuring fair transaction sequencing and protecting users from value extraction on every trade.

ANTI-MEV & THRESHOLD ENCRYPTION

Anubis eliminates front-running and value extraction with a threshold-encrypted mempool and blind transaction ordering. All pending transactions are encrypted and shuffled before validation, ensuring fair sequencing and protecting users from MEV attacks—while maintaining the speed and security of a Layer 1 blockchain.

REGULATORY-FRIENDLY PRIVACY

Built with ZK-KYC and selective audit capabilities, Anubis bridges the gap between decentralized finance and regulatory compliance. Institutions and users can prove eligibility without revealing sensitive data, enabling AML/CFT adherence while preserving full privacy—opening the door to institutional-grade DeFi and real-world financial applications.

PRIVACY DOMAINS

Anubis’ high-speed privacy domains process transactions asynchronously, with configurable privacy levels. Braided by the Core Chain, they ensure shared security and interoperable privacy proofs network-wide.

CORE PRIVACY CHAIN

The Core Privacy Chain acts as the "knot" tying all Anubis privacy domains together. It braids domains into a unified network, facilitating the transfer of ZK proofs, selective audit data, and cross-domain transactions while preserving end-user privacy.