What Is BITE?
BITE (Blockchain Interoperability and Trustless Execution) adds encryption to SKALE while keeping full EVM compatibility. Transactions stay encrypted during mempool and consensus, then are decrypted by the validator committee for execution. Once executed, transaction details are visible on-chain like any other transaction.Why BITE?
Public blockchains expose everything—transaction amounts, contract calls, user intent. This creates problems:- MEV - Bots see your transactions before they’re confirmed and front-run them
- Privacy - Sensitive business and personal data is visible to everyone
- Competition - Competitors can monitor your contract interactions
How It Works
BITE extends SKALE with threshold encryption built into consensus:- Encrypt - Your wallet encrypts the
toanddatafields using SKALE’s threshold public key - Submit - Encrypted transaction goes to the BITE precompile (magic address)
- Finalize - Consensus finalizes the encrypted transaction without seeing contents
- Decrypt - After finality, the validator committee runs threshold decryption
- Execute - Transaction executes normally in the EVM
Key Properties
MEV Resistance
By encryptingto and data, BITE removes the information MEV bots need:
- No front-running (intent hidden until finality)
- No sandwich attacks (bots can’t see swaps)
- No censorship (validators can’t filter by content)
Threshold Decryption
No single node can decrypt transactions. The validator committee jointly decrypts using threshold BLS—a minimum number of validators must collaborate. Keys rotate each epoch using onchain DKG.Zero Trust
You don’t need to trust any single party. The cryptography ensures:- No early decryption (requires threshold of validators)
- No selective decryption (all or nothing per epoch)
- No single point of failure (distributed key generation)
EVM Compatible
BITE works with existing tooling:- Metamask, WalletConnect, and other wallets
- Foundry, Hardhat, and other development frameworks
- Ethers.js, Viem, and other web3 libraries
- Existing Solidity contracts (no changes needed for Phase 1)
Phases
BITE rolls out in four phases:| Phase | Name | Status |
|---|---|---|
| 1 | Encrypted Transactions | Live on SKALE Base |
| 2 | Conditional Transactions | Sandbox |
| 3 | Threshold Re-encryption | Roadmap |
| 4 | Fully Homomorphic Encryption | Roadmap |
Learn More
- Phases of BITE - Evolution and phases of BITE Protocol
- Encrypted Transactions - Phase 1 details and use cases
- Conditional Transactions - Phase 2 details and use cases
