Cloaked
The Problem
Onchain activity is public by default. If someone knows one of your addresses, they can see your balance, who you pay, who pays you, and your full transaction history. ENS names, social profiles, and even a single transaction can link your identity to all of this.
What Cloaked Does
Cloaked uses stealth addresses to separate your financial activity from your public identity. Every payment you receive goes to a fresh address that only you can control — keeping your balances, counterparties, and transaction history confidential by default.
Cloaked handles the complexity — address derivation, blockchain scanning, balance aggregation, transaction construction — while you keep full custody of your funds. The service coordinates; only you hold the keys.
Benefits
- Per-payment addresses — each deposit lands at a unique address, so your transaction history stays private
- Confidential balances — people who pay you don't see what you hold or who else pays you
- ENS-native — receive funds at
username.clkd.ethor share ausername.clkd.idpayment page; privacy happens automatically - Self-custody — Cloaked never holds your funds or private keys; everything is recoverable via the open-source SDK
- Passkey or wallet — register with a biometric passkey or connect an existing wallet
- Teams — multisig accounts with k-of-n threshold signing for organizations
- API & SDK — programmatic access for server-to-server integrations, agents, and automated operations
Supported Networks & Tokens
Cloaked currently supports Ethereum and Base. Supported tokens come from the Uniswap default token list — a curated allowlist of established ERC-20s — plus native ETH on every chain. If you're interested in additional networks, reach out.
Use Cases
- Individuals — use the browser wallet to send and receive with stealth addresses → Using Cloaked
- Teams & organizations — multisig accounts with API access → Developers
- Builders — integrate stealth address payments into your app via API/SDK → API Reference
How It Works
See How It Works for a full technical deep dive into stealth addresses.

