Secret Network is the one privacy chain where the quantum picture is mostly good news. Confidentiality is TEE-based. SGX seal keys are AES-flavour, Grover-weakened but not Shor-broken. Sealed state survives where zk-SNARK privacy does not: 45% privacy preserved in the worst-case scenario versus 0% for Penumbra.
Summary
Secret Network uses SGX TEE-based privacy (not crypto-based). Band 2 (Acknowledged). Different retroactive profile from zk-privacy chains: Shor breaks attestation ECDSA (forgery enabled) but does not directly decrypt sealed state (AES seal keys only Grover-weakened). Stronger privacy preservation than Penumbra in quantum-suddenly scenario. Zero PQC work at chain level.
What the gates say
- Hybrid: FAIL. No hybrid plan on file.
- Evidence: PASS. Sources reconstructable by third party.
- Primitive naming: PASS. Named primitives at every scored sub-level.
Burn-vs-rescue policy on file
undeclared
Seven dimensions
Each dimension scores 0-100 internally; the weighted roll-up produces the QRI on the left. Open a row to read the sub-score detail.
1 Cryptographic Exposure 32 / 100
Ed25519 (CometBFT consensus) · secp256k1 (Cosmos SDK accounts) · SHA-256 · Intel SGX attestation (ECDSA + RSA)2 HNDL Exposure 20 / 100
secp256k1 + Ed25519 pubkeys exposed.
Same.
Tx-once for accounts; validator keys persistent.
SGX seal keys protect private contract state. SGX attestation ECDSA break forges attestations → possibly unseal.
3 Metadata & Privacy Exposure 40 / 100
Privacy is smart-contract-level (TEE-sealed state). Tx graph at consensus layer is partially visible (sender/gas) but payload is encrypted via SGX.
Figment, Keplr-hosted RPC.
IBC bridges leak metadata.
Privacy is TEE-based (SGX), not crypto-based — different quantum profile. Shor break of SGX attestation ECDSA could enable attestation forgery but does not directly decrypt sealed state. Sealed state depends on SGX seal keys (AES-like), only Grover-weakened. Better retroactive posture than zk-SNARK privacy chains.
4 Migration Architecture 25 / 100
Cosmos SDK module-based. PQC signature module addable via module upgrade.
Standard Cosmos accounts.
Multiple upgrades. CometBFT coordination.
Not architected.
5 Deployment Execution 0 / 100
DoraFactory cosmos-pqc is external reference; Secret has no own milestones.
6 Supply Chain Vendor Readiness 5 / 100
7 Governance & Coordination 35 / 100
80 validators.
Multiple upgrades, SecretAI/SecretVM pivots.
SCRT Labs.
Multiple SGX vulnerability responses.
The X + Y vs Z inequality
X (data shelf life): 10-15 (sealed contract state long-lived)
Y (migration time): 10-15
Z10 (10% CRQC year): 2036 · Z50 (50%): 2041
Verdict: X+Y > Z (danger).
Four-scenario grid
| Scenario | Value preserved | Privacy preserved |
|---|---|---|
| quantum never | 100% | 100% |
| arrives suddenly pre migration | 5% | 45% |
| arrives slowly post migration | 75% | 65% |
| arrives slowly mid migration | 30% | 45% |
Peers in the privacy-L2 profile
Order-book view of the 5 chains closest to Secret Network by QRI.
Public artifacts used for this scorecard
Each entry below is a sub-score citation. Clicking the link takes you to the public source. A third party should be able to reconstruct every number on this page from these URLs in 48 hours.
Supply chain snapshot
A chain's supply chain cannot migrate faster than its slowest dependency. Zero PQC roadmaps in any of the four categories is a structural blocker, not a lagging indicator.
Analyst notes on the scoring
TEE-privacy retroactive-deanon profile markedly better than zk-privacy: sealed state survives Shor. Privacy_preserved_pct=45% in sudden-pre-migration (vs 0% for Penumbra) reflects SGX seal key survivability. SGX hardware faults (classical) are bigger near-term risk.
Scorecard metadata
- Profile: privacy-L2
- Scored: 2026-04-18 by
layerqu-v2-scoring-agent-4 - v1 reference:
chainscreen-v1-archive - QRI raw: 14 · after caps: 12
- Confidence interval: ±15
- PQC washing ratio: 1x
- Burn-vs-rescue: undeclared
Caps triggered
- Mosca (5a<20%)
- Sutor (5d=0)
- Preskill (<3 artifacts several dims → ×0.5)
- Casado
- Hybrid gate FAIL → QRI cap 60