REIGNITE PRIVACY FINANCE.
Anubis Network is the first selective privacy Layer 1, built on PLONK ZK-Proofs. It balances user privacy, regulatory compliance and seamless EVM-compatible transactions.
/ launching_anubischain_network
/ sequence_initiated
/ launching_anubischain_network
/ sequence_initiated
/ launching_anubischain_network
/ sequence_initiated
/ 56% complete
struct group_info init_groups = { .usage = ATOMIC_INIT(2)
};
struct group_info *groups_alloc(int gidsetsize){
struct group_info *group_info;
int nblocks;
int i;
nblocks = (gidsetsize + NGROUPS_PER_BLOCK - 1) /
NGROUPS_PER_BLOCK;
/* Make sure we always allocate at
least one indirect block pointer */
nblocks = nblocks ? :
1;
group_info = kmalloc(sizeof(*group_info) +
nblocks*sizeof(gid_t *), GFP_USER);
if (!group_info)
return NULL;
group_info->ngroups = gidsetsize;
group_info->nblocks = nblocks;
atomic_set(&group_info->usage, 1);
if (gidsetsize <= NGROUPS_SMALL)
group_info->blocks[0] = group_info->small_block;
else {
for (i = 0; i < nblocks; i++) {
gid_t
*b;
b = (void *)__get_free_page(GFP_USER);
if (!b)
goto out_undo_partial_alloc;
group_info->blocks[i] =
b;
}
}
return group_info;
EXPORT_SYMBOL(groups_alloc);
void groups_free(struct group_info *group_info)
{
if (group_info->blocks[0] != group_info->small_block) {
int i;
for (i = 0; i < group_info->nblocks; i++)
free_page((unsigned long)group_info->blocks[i]);
}
kfree(group_info);
}
EXPORT_SYMB|
/ launching_anubischain_network
/ sequence_initiated
/ launching_anubischain_network
/ sequence_initiated
/ launching_anubischain_network
/ sequence_initiated
/ 56% complete
struct group_info init_groups = { .usage = ATOMIC_INIT(2)
};
struct group_info *groups_alloc(int gidsetsize){
struct group_info *group_info;
int nblocks;
int i;
nblocks = (gidsetsize + NGROUPS_PER_BLOCK - 1) /
NGROUPS_PER_BLOCK;
/* Make sure we always allocate at
least one indirect block pointer */
nblocks = nblocks ? :
1;
group_info = kmalloc(sizeof(*group_info) +
nblocks*sizeof(gid_t *), GFP_USER);
if (!group_info)
return NULL;
group_info->ngroups = gidsetsize;
group_info->nblocks = nblocks;
atomic_set(&group_info->usage, 1);
if (gidsetsize <= NGROUPS_SMALL)
group_info->blocks[0] = group_info->small_block;
else {
for (i = 0; i < nblocks; i++) {
gid_t
*b;
b = (void *)__get_free_page(GFP_USER);
if (!b)
goto out_undo_partial_alloc;
group_info->blocks[i] =
b;
}
}
return group_info;
EXPORT_SYMBOL(groups_alloc);
void groups_free(struct group_info *group_info)
{
if (group_info->blocks[0] != group_info->small_block) {
int i;
for (i = 0; i < group_info->nblocks; i++)
free_page((unsigned long)group_info->blocks[i]);
}
kfree(group_info);
}
EXPORT_SYMB|
/ launching_anubischain_network
/ sequence_initiated
/
loading...
Anubis Network is the first selective privacy Layer 1, built on PLONK ZK-Proofs. It balances user privacy, regulatory compliance and seamless EVM-compatible transactions.
Leverage the power of PLONK zero-knowledge proofs to unlock selective privacy for every transaction. Our hybrid state model merges the best of UTXO and account-based systems, delivering instant finality and full EVM compatibility.
Anubis Network features privacy-native smart contracts and selective disclosure primitives, ensuring equitable and efficient execution in private DeFi markets. Additionally, we’ve implemented ZK-based identity and resource proofs, which enables the transfer of verifiable credentials, truly decentralized identity infrastructure and other markets for privacy-preserving digital resource exchange.
Established in 2020, it is one of the leading community-clustered investment institutions in the cryptocurrency sector.
A core ecosystem incubator and capital engine built on AnubisChain.
Anubis leverages PLONK ZK-Proofs for constant-size proofs & fast verification, enabling selective data disclosure with fully encrypted user identities and sensitive data.
100% EVM-compatible and built on a modified Geth client, Anubis allows Solidity developers to deploy existing smart contracts without modification, with full access to Ethereum’s tooling and ecosystem.
With built-in ZK-KYC and selective audit capabilities, Anubis enables compliance with AML/CFT requirements while preserving user privacy—creating a bridge between TradFi and the decentralized web.
Our threshold-encrypted mempool and blind transaction ordering eliminate front-running and MEV attacks, ensuring fair transaction sequencing and protecting users from value extraction on every trade.
Anubis eliminates front-running and value extraction with a threshold-encrypted mempool and blind transaction ordering. All pending transactions are encrypted and shuffled before validation, ensuring fair sequencing and protecting users from MEV attacks—while maintaining the speed and security of a Layer 1 blockchain.
Built with ZK-KYC and selective audit capabilities, Anubis bridges the gap between decentralized finance and regulatory compliance. Institutions and users can prove eligibility without revealing sensitive data, enabling AML/CFT adherence while preserving full privacy—opening the door to institutional-grade DeFi and real-world financial applications.
Anubis’ high-speed privacy domains process transactions asynchronously, with configurable privacy levels. Braided by the Core Chain, they ensure shared security and interoperable privacy proofs network-wide.
The Core Privacy Chain acts as the "knot" tying all Anubis privacy domains together. It braids domains into a unified network, facilitating the transfer of ZK proofs, selective audit data, and cross-domain transactions while preserving end-user privacy.