NEAR Protocol Activates Private Cross-Chain Swaps via Intents
The NEAR Foundation has announced the activation of a confidential payments feature built upon its new Intents protocol. The initial implementation enables users to execute private cross-chain swaps, sending NEAR tokens from the NEAR network and receiving ETH on the Ethereum mainnet. The system is d
The NEAR Foundation has announced the activation of a confidential payments feature built upon its new Intents protocol. The initial implementation enables users to execute private cross-chain swaps, sending NEAR tokens from the NEAR network and receiving ETH on the Ethereum mainnet. The system is designed to obscure transaction details, such as amounts and the link between the sender and receiver, from public on-chain view. This functionality is not a native protocol feature but an application layer service that combines an intent-centric execution model with a privacy mechanism based on zero-knowledge proofs, orchestrated by a network of off-chain actors known as solvers.
The architecture of NEAR's confidential payments involves four primary components: the user intent, the solver network, a shielded pool on NEAR, and the cross-chain settlement layer. The process deviates significantly from a standard decentralised exchange transaction.
1. User Intent: Instead of crafting a specific transaction, a user expresses a desired outcome, or 'intent'. For example: "I want to convert 100 NEAR into the maximum possible amount of ETH, delivered to address 0x... on Ethereum, without revealing this transaction on-chain". This intent is a signed message, not a blockchain transaction, and is broadcast to a network of solvers.
2. Shielded Pool: To enable privacy, the user first deposits their NEAR tokens into a shielded pool contract on the NEAR blockchain. This process is analogous to the deposit function in privacy protocols like Tornado Cash or Zcash. The deposit generates a cryptographic note or commitment, which the user holds privately. The user can then generate a zero-knowledge proof (ZKP) to prove ownership of funds within the pool without revealing their specific deposit or identity.
3. Solver Network: Solvers are sophisticated, off-chain agents that monitor the stream of user intents. Upon seeing the user's private swap intent, they compete to offer the best execution. A solver's role is to find the most efficient path to fulfil the intent. This may involve sourcing liquidity from various venues, including centralised exchanges, decentralised exchanges, or their own private inventory. The solver is responsible for bridging the assets and bearing the complexity of the cross-chain operation.
4. Execution and Settlement: The winning solver accepts the user's intent. The user provides the solver with the ZKP, which proves they have the authority to spend the specified amount from the shielded pool on NEAR. The solver verifies this proof and claims the user's NEAR tokens from the pool. Crucially, from an on-chain perspective, the solver is simply withdrawing funds from the shielded pool; the link to the original depositor is broken by the ZKP. Simultaneously, the solver sends the agreed-upon amount of ETH to the user's designated address on the Ethereum network. The user trusts the solver to complete the second leg of the transaction after the solver has claimed the NEAR.
This architecture delegates execution trust to the solver network. While competition between solvers is designed to ensure fair pricing and prevent censorship by a single actor, the system is not trustless. The user relies on the solver to finalise the swap. The security of the funds depends on the integrity of the shielded pool's smart contracts and the underlying zero-knowledge cryptography. The initial set of solvers appears to be permissioned, creating a potential vector for centralisation and control over transaction flow.
Pattern
NEAR's approach combines two significant trends in protocol design: intent-based architectures and applied zero-knowledge privacy. It is a direct implementation of patterns seen elsewhere in the ecosystem, synthesised for a specific cross-chain use case.
The intent-centric model mirrors systems like CoW Swap and 1inch Fusion on Ethereum. These protocols abstract transaction complexity away from the user and offload it to a professional class of searchers or solvers who compete to find the optimal execution path. This protects users from issues like MEV (Maximal Extractable Value) and failed transactions, but introduces the solver as a new, semi-trusted intermediary. NEAR is applying this user-experience-focused model to the more complex domain of cross-chain swaps.
The privacy mechanism is a direct descendant of shielded pool systems. The deposit, ZKP, and withdrawal mechanics are functionally identical to those pioneered by Zcash and later popularised by Tornado Cash. By integrating this into an intent-based framework, NEAR creates a user-facing product that offers privacy without requiring the user to manage cryptographic notes or execute complex ZKP-related transactions manually. The solver handles the 'withdrawal' part of the privacy transaction on the user's behalf.
This synthesis represents a move towards embedded, application-specific privacy rather than protocol-level anonymity. Instead of making the entire chain private, it provides a discrete tool for users who require confidentiality for specific transactions, managed through a simplified, intent-driven interface.
Forward Implication
The primary consequence of this architecture is the creation of a new, highly exposed class of network participant: the solver. By facilitating private, cross-chain transfers of value, solvers are performing functions that map closely onto those of a money services business (MSB) or money transmitter. They receive value from one party (in NEAR, via the shielded pool) and transmit value to another (in ETH, on a different chain), with the explicit purpose of breaking the on-chain link between the two.
This positions solvers as a critical point of regulatory risk. Following the sanctioning of the Tornado Cash protocol and the prosecution of its developers, regulators have demonstrated a clear intent to target entities that facilitate obfuscated financial flows. Solvers in the NEAR Intents system are identifiable, on-chain actors. Their operations are public, even if the user intents they serve are private. This makes them a tangible target for enforcement actions, which could include asset freezes, sanctions, or legal proceedings.
The viability of NEAR's confidential payments system may therefore depend less on its technical sophistication and more on the risk tolerance of its solver network. A crackdown on a few key solvers could have a chilling effect, potentially leading to a collapse in liquidity and execution quality for private intents. The degree to which the solver set is decentralised and permissionless will be a critical factor in its resilience. If the network relies on a small number of large, professionalised solvers, it remains highly vulnerable to targeted regulatory pressure.
---
Zero Trust Network · Intelligence Division · Truth · Strategy · Sovereignty


Discussion