Clover Research
Welcome. I can walk you through Clover's private execution, encrypted vaults, policy automation, offline settlement, and Ethereum/Solana routing. What would you like to explore?
Clover is a privacy-native L1 and institutional operating system for high-velocity digital assets. Execute, automate, settle offline, and scale without exposing your strategy.
Clover is not another privacy layer on someone else's chain. It is a privacy-native L1 with an institutional operating surface for execution, vaulting, identity, automation, and offline settlement.

| Capability | Private OS + L1 Clover | Relay layer Flashbots | Privacy L2 Aztec | Shielded DeFi![]() | Offline-first L1 KnoxNet |
|---|---|---|---|---|---|
| Primary advantage | All four privacy layers in one stack Execution, confidential balances, identity controls, and intent automation. | Excellent transaction protection Strong at private relay routing, but not a full privacy operating surface. | Excellent programmable privacy Very strong private app model inside a privacy-first L2 environment. | Excellent shielded DeFi flows Strong private balances and DeFi interactions across supported EVM ecosystems. | Excellent offline-first transfer model Built around local execution and deferred online settlement. |
| Execution privacy | Private routing across live capital flows Designed for Ethereum builder lanes, Solana bundle lanes, and encrypted treasury movement. | Ethereum private relay Protect RPC is highly relevant for frontrunning resistance, but narrower in scope. | Private execution inside Aztec Strong inside its own VM and rollup model rather than as a broad routing layer. | Shielded contract interaction Private contract calls and transfers, but not positioned as a unified execution desk. | Offline-first local execution Very differentiated for local transfer privacy, less aligned to multi-venue digital finance routing. |
| Confidential balances | Encrypted vault state with gated reveal Institutional treasury can stay encrypted while authorized decryption remains controlled. | Not a balance privacy product Focused on transaction delivery and MEV-aware routing rather than hidden balances. | Private state Private notes and state are core to the Aztec model. | Shielded balances Private balances are a core wallet and protocol concept. | Encrypted settlement constraints Settlement is designed to verify correctness without exposing transaction details. |
| Identity + policy controls | Built for shielded identity workflows KYC-aware, disclosure-minimized identity is part of the platform direction, not an afterthought. | No native identity layer Users bring their own wallet and routing setup. | Possible at app level Powerful for builders, but identity policy is not the product headline. | External assurance tools Can integrate assurances around private activity, but not a native identity command layer. | Not the central product promise The core story is offline execution and encrypted settlement. |
| Automation layer | Intent automation is part of the OS thesis Policies, treasury rules, and execution logic belong in the same privacy surface. | Searcher tooling, not user automation Powerful infrastructure, but not presented as an institutional automation cockpit. | Builder-defined programmability Developers can compose private apps, but operations teams still need their own interface layer. | Workflow-level privacy Strong private interactions, but not an operating system for policy automation. | Not the main product focus The stronger story is cash-like local transfer privacy. |
| Offline transfers - no internet needed | Full offline transfers, zero connectivity required Send and receive value between devices with no internet connection. Transactions are signed, queued, and cryptographically sealed locally - then settle on-chain whenever connectivity returns. The exact same offline transfer model as KnoxNet, built natively into Clover. | Requires live RPC connection Relay-based architecture depends on real-time connectivity to Ethereum builders. | Online L2 settlement required Rollup model requires network participation for proof generation and state updates. | Online relayer dependency Shielded transfers rely on active relayers and live chain access. | Core offline-first design Built around local execution and deferred settlement - the defining product thesis. |
| Native L1 blockchain | Purpose-built privacy L1 with offline settlement Clover operates its own L1 chain with native privacy primitives, offline-first settlement, and encrypted state - the same sovereign chain model as KnoxNet, but extended with cross-chain routing to Ethereum and Solana. | No native chain Operates as infrastructure on top of Ethereum, not a standalone network. | L2 rollup on Ethereum Privacy-focused rollup, not a sovereign L1. Inherits Ethereum security but depends on it. | Smart contract protocol Deploys on existing chains rather than operating its own network. | Offline-first L1 Sovereign L1 designed for local execution and deferred settlement. |
| Device-to-device value transfer | Encrypted peer transfer with policy controls Transfer value directly between devices - air-gapped, no network, no intermediary. Same cash-like transfer model as KnoxNet, plus institutional policy gates and hardware-isolated signing. | Not in product scope Focused on MEV protection and relay infrastructure, not peer transfer. | Requires L2 network Transfers require rollup participation and proof generation. | Standard wallet signing Uses existing wallet infrastructure without native device-to-device support. | Offline device transfer Core product feature - device-to-device value movement without network. |
| Institutional operating surface | One command surface Institutions do not need four vendors for routing, vaulting, policy, and visibility control. | Infrastructure component Critical plumbing, but not a full treasury or privacy operating environment. | Privacy platform for builders A developer ecosystem more than an end-state institutional workspace. | Wallet + integration ecosystem Strong point solution for shielded usage, less of an all-in-one command center. | New network architecture Compelling protocol direction, but a different operating model than an institutional finance OS. |

Join the waitlist for Clover OS v2.0. Institutional access is currently by invitation only.