From Enclave to The Interfold
Today, Enclave becomes The Interfold.
The name Enclave suggested containment, a sealed boundary around sensitive computation. It carried a strong association with hardware security systems such as TEEs and HSMs.
But what we built is coordination infrastructure that distributes execution itself: allowing independent parties to produce shared, verifiable outcomes from private inputs without pooling data or delegating execution to a single operator.
Such a capability can't live inside a single machine, belong to a vendor, or sit behind a wall.
That capability requires a network. The Interfold names that network.
What is The Interfold?
The Interfold is a distributed network that enables confidential coordination between independent parties.
Confidential coordination is not privacy as isolation. It is privacy in relation. Many parties. Many operators. No vantage point from which the entire system can be seen or controlled. Multiplayer privacy.
Confidential coordination means independent parties can produce shared computational outcomes together without custody, exposure, or trusted hardware. This enables everything from secret ballots and sealed-bid auctions to cross-institutional analytics.
Independent ciphernodes — operators who collectively enforce encrypted execution — run the network under threshold cryptographic control. No single operator can observe the full computation. No single operator can determine the outcome. Decryption authority is distributed by design.
The name reflects that architecture.
“Fold” evokes aggregation and concealment, suggesting many encrypted inputs combining into a single outcome. “Inter” signals coordination between independent actors. And the definite article (“the”) makes the claim explicit: This is not a feature, product, or module. It is infrastructure.
The name draws from ideas of folded space and hidden dimensionality — from the foldspace of Dune to the pocket universes of Death’s End, to manifold geometry itself. These are domains that remain distinct, yet can interact without collapsing into one another.
Why Confidential Coordination Matters
Modern coordination increasingly runs on computation. Cities tally votes. Investors submit sealed bids. Hospitals collaborate on sensitive data. Institutions model shared risk.
These outcomes are no longer negotiated in rooms. They are computed in digital systems. And computation still happens somewhere:
Inside a cloud provider.
Inside a hardware enclave.
Inside a custodial exchange.
Inside an operator-controlled MPC cluster.
In most systems, even when inputs are encrypted, execution authority still concentrates somewhere. There is always a center.
And when there is a center, there is a privileged viewer: someone who sees intermediate states, timing, failure, strategy before outcome — not necessarily through malice, but through structural position.
Position compounds into asymmetry.
Asymmetry compounds into leverage.
Leverage compounds into structural power.

For years, institutions absorbed this constraint because there was no alternative. Custodial execution was treated as inevitable.
Confidential coordination alters that topology. Groups can compute together without producing a single vantage point from which the entire process can be observed or steered. Encrypted inputs are processed within ephemeral Encrypted Execution Environments (E3s), enforced collectively by independent ciphernode operators. Outcomes are verifiable. Inputs remain private.
Verification is what allows coordination to scale without trust. Outcomes are publicly provable, even when inputs remain private.
This makes confidential coordination viable:
Secret ballots without a central coordinator.
Sealed-bid auctions without a trusted auctioneer.
Cross-institutional analysis without pooling raw data.
Multi-agent systems that compute without exposing internal state.
As coordination becomes computation, the structure of execution determines who governs it.
The Interfold distributes that structure.
Where We Are
The Interfold is in internal testnet.
Encrypted execution is running end-to-end under distributed enforcement. Ciphernodes operate under controlled threshold conditions, validating that execution authority can be distributed without degrading correctness or liveness.
Next comes expansion:
- Phase 1: Internal testnet (underway)
- Phase 2: Public testnet
- Phase 3: Network launch and ciphernode activation
The final phase establishes the distributed operator layer that secures encrypted execution at the network level. Not as policy, but as architecture.
Confidential coordination depends on these independent ciphernode operators enforcing threshold cryptography and staking economic guarantees behind execution. As the operator base expands and diversifies, the network becomes more credibly neutral, more resilient, and more resistant to capture.
This will mark the formation of a new execution layer in the stack.
What Comes Next
We will expand testnet access, release operator tooling, publish foundational essays and technical documentation, and formalize network launch mechanics.
The objective is simple: establish a distributed execution network that makes confidential coordination reliable at scale — across markets, governance systems, institutions, and multi-agent environments.
The Interfold is the execution architecture that makes it possible.
Follow development of The Interfold in our Telegram.