Curated developer articles, tutorials, and guides — auto-updated hourly


Private AI Inference with Midnight: Proving Model Outputs Without Revealing Inputs Every...


Designing Public vs. Private State in Compact: What Goes Where and Why One of the first...


Building Private NFT Marketplaces on Midnight: Hidden Ownership, Anonymous Trading NFT...


Managing Private State in Midnight: Patterns, Pitfalls, and Best Practices One of the most...


Midnight vs. Aztec vs. Aleo vs. Mina vs. Zcash: A Developer's Guide to Privacy Chain...


Why ownPublicKey() Is Unsafe for Access Control in Compact There's a pattern I see in...


Security Checklist for Midnight dApps Before Deployment Deploying a Midnight dApp without...


Accepting Token Deposits in Compact: ReceiveShielded, Escrow, and Coin Merging Building a...


Selective Disclosure Patterns in Compact: Proving Without Revealing The phrase "I can...


Token Gates on Midnight: Verifying Asset Ownership and Membership with ZK Proofs Token...


Managing Private State in Midnight: Patterns, Pitfalls, and Best Practices One of the most...


Commit/Reveal Voting on Midnight: Building a Private DAO Ballot Most on-chain voting...


Thinking in Compact: A Guide for Circom Developers If you've written Circom circuits, you...


Witnesses in Depth: Patterns, Types, and Real Use Cases in Compact Every Compact circuit...


The Claude Prompts I Use to Build Midnight dApps Faster Midnight's development stack is...


Building a Shielded Token Vault in Compact: Deposit, Accumulate, and Withdraw with...


Verified Math in ZK Circuits: Division, Exchange Rates & Overflow in Compact If you've...


Building a Private AMM on Midnight: Constant Product Pools with ZK Privacy Automated...


Compact Standard Library: A Practical Guide to Every Export The Compact standard library...


Managing Private State in Midnight: Patterns, Pitfalls, and Best Practices One of the most...


Bringing External Data On-Chain: Oracle Patterns for Midnight Midnight doesn't have a...


Building a Private AMM on Midnight: Constant Product Pools with ZK Privacy Automated...


Replay Attack Prevention in Compact: Nonces, Nullifiers & Domain Separation A replay...


When Your Midnight Contract Is Too Large to Deploy You built a DeFi protocol on Midnight...