Are you an LLM? Read llms.txt for a summary of the docs, or llms-full.txt for the full context.
Skip to content
Mirage Researcher Grants for Independent Privacy Research

Mirage Researcher Grants for Independent Privacy Research

April 23, 2026 by Nima Rasooli
Mirage Researcher Grants

Privacy infrastructure only earns trust when its claims hold up under independent scrutiny. Mirage Researcher Grants fund external researchers to test those claims directly.

We’re offering grants of up to $5,000 for rigorous, adversarial analysis of Mirage’s privacy properties under realistic conditions.

Mirage is designed to make private stablecoin transactions indistinguishable from ordinary onchain activity. Each transaction deploys a unique escrow contract via Azoth (our open-source EVM bytecode obfuscator), so there is no stable bytecode signature to track. Execution occurs inside Trusted Execution Environments, preventing nodes from accessing decrypted request data. The Nomad network processes signals in a distributed manner, ensuring that no single node has full visibility. Unlike mixers, Mirage avoids shared pools that cluster users by default.

These are strong claims. We want them tested.

What we're looking for

We're most interested in research that tests the system under conditions that reflect how an adversary would actually approach it. What matters here are realistic attempts to trace transactions, cluster behavior, or extract metadata from routing and timing patterns. Theoretical edge cases are not a priority.

Relevant directions include:

  • Network analytics against Mirage transaction flows
  • Obfuscation analysis of Azoth and Mirage network behavior
  • Deanonymization attempts using realistic threat models
  • Metadata leakage across routing, timing, or transaction patterns
  • Empirical measurement of privacy guarantees in production-like conditions
  • Reproducible attack or measurement frameworks

If your work doesn't fit neatly into one of these categories but is clearly relevant, we encourage you to apply anyway and explain why.

Grant amounts

Grants range from $500 to $5,000.

The final amount depends on scope, rigor, novelty, and how useful the findings are in practice. We may decline, partially fund, or ask you to revise the scope before approving anything.

What to include in your application

Applications should be concise but specific. Focus on clarity over length. Your application should cover:

  • Research objective and hypothesis
  • Scope of analysis
  • Methodology and evaluation approach
  • Expected outputs (report, code, datasets, etc.)
  • Timeline and requested funding
  • Relevant prior work, publications, repos, talks, or anything else that shows you know this space
  • Any assumptions, prerequisites, or access you'll need from us

We evaluate submissions based on technical quality, realism, reproducibility, and practical relevance to Mirage users and infrastructure.

Deliverables

  • Before starting: a short, approved proposal
  • During the project: progress updates for longer engagements
  • At completion: a written report, with supporting data, code, or proofs of concept where appropriate

We value clear conclusions, explicit limitations, and actionable recommendations.

The application form

It's one page. You'll pick your research track, describe your background, and answer a few quick self-assessment questions on languages (Python, Solidity/Vyper, Rust, Go) and topic areas such as timing analysis, smart contract security, and cryptographic protocol design. You'll also tell us whether you've already started or need the grant to begin, when you could kick off, and your rough timeline. Options range from 1–3 months to over a year.

No lengthy document is required at this stage.

A few things to know before applying

  • Grants are discretionary. Applying doesn't guarantee funding.
  • Work isn't eligible for payment until we've approved it in advance.
  • This is separate from the bug bounty program.
  • Submitting a proposal doesn't create any employment or partnership relationship.
  • Research must be conducted lawfully. Avoid unnecessary privacy violations, service disruption, or destructive testing.

Apply

If this is the kind of work you do, we want to hear from you: https://forms.gle/KEbiwBEDUGgfgrZ67