Sui Private Transactions: What Builders Should Expect in 2026

Mysten has been signaling protocol-level private transactions for 2026.

Sui Says ‘Private Transactions’ Are Coming in 2026—Here’s What Builders Should Assume — Natsai

Sui’s move to protocol-level privacy as the default, enforced at both consensus and transaction propagation layers, will force a fundamental rethink of how builders approach object data flows and composability. Unlike opt-in privacy, every transaction and object state transition will be confidential by default, with validator nodes required to process encrypted payloads and propagate only privacy-compliant metadata across the network.

Object-centric confidentiality will extend to both the state and ownership of Sui objects, enforced directly at the runtime level. Builders will need to assume that object state, ownership, and even object existence can be private, with new enforcement primitives in the Move runtime and consensus logic. This shift breaks the long-standing assumption that object IDs and ownership are always public.

Encrypted object payloads will become the norm, requiring new indexing and query strategies for confidential state. Traditional state queries and analytics will no longer function out-of-the-box, as object fields and even object references may be encrypted, necessitating privacy-preserving search and zero-knowledge proof-based state attestations. Sui’s technical docs already hint at these changes.

The Move language and bytecode/runtime will see deep changes to support confidential state transitions. Expect new primitives and type system modifications for handling encrypted fields, authenticated state updates, and privacy-preserving method calls. Builders will need to explicitly handle access permissions and capabilities for private objects at both the Move module and runtime levels, with fine-grained control over who can decrypt or mutate confidential state.

Privacy-preserving composability will become a design constraint, as composing private objects across Move modules must avoid state leaks or privilege escalation. Patterns for cross-module calls, object transfers, and capability delegation will need to be re-examined, with runtime checks to prevent accidental disclosure of sensitive state or relationships.

Developer tooling and debugging will be fundamentally challenged by encrypted Move objects. State inspection, error tracing, and even basic logging will be limited or require special “debug keys,” raising new questions about testnet workflows and on-chain forensics. Builders should expect to lose some of the introspection they’re accustomed to, with encrypted state transitions making post-mortem analysis non-trivial.

Sui’s parallel execution model (Mysticeti) will need to handle encrypted state without introducing metadata leakage or concurrency-based information leaks. Builders will need to understand how encrypted objects are scheduled and executed in parallel, and how Mysticeti’s speculative execution interacts with confidential state. The risk of side-channel leaks via execution timing or resource contention will need new mitigations (Mysticeti v2).

Consensus and validator-level privacy will rely on threshold encryption or zk-proofs to prevent validators from accessing confidential state unless explicitly permitted. This changes the validator threat model and may require new hardware or cryptographic co-processors, as well as protocol changes to ensure validators can still slash malicious peers without direct state access.

State sync, re-org, and validator slashing processes will be overhauled to accommodate private transactions and encrypted state. Builders should expect new protocols for syncing encrypted state, handling re-orgs without leaking historical state, and slashing validators based on zero-knowledge proofs of misbehavior rather than direct evidence.

Versioning and upgrade paths for privacy features will be managed across Sui epochs, with staged rollout and feature gating. Builders will need to track which privacy features are active in a given epoch, and design contracts for forward-compatibility as new primitives are introduced and legacy public objects are phased out (see Sui forum discussions).

Selective disclosure and programmable auditability hooks will be required for compliance, enabling object-level selective state reveal to satisfy FATF/MiCA requirements. Builders must design for programmable audit trails and consent-based state reveals, balancing privacy with regulatory mandates.

The evaluation of cryptographic primitives—ZK-SNARKs, threshold encryption, and post-quantum schemes—will directly impact Mysticeti v2 throughput. Builders will need to benchmark and optimize for the performance implications of these primitives, as protocol-native privacy will increase computational overhead and may affect transaction latency.

Wallet and dApp UX will be reshaped by encrypted object management, consent flows, and selective disclosure. Builders must rethink how users grant access, manage private keys, and interact with confidential objects, as traditional wallet patterns may not suffice for protocol-level privacy.

Cross-chain and bridge operations will face new limitations, with privacy loss or object non-transferability when moving private objects off Sui. Builders should be aware that protocol-native privacy primitives may not be portable to other chains, constraining interoperability and requiring explicit privacy downgrade paths.

Existing privacy tools like Seal will face forward-compatibility limits with Sui’s protocol-native privacy primitives. Builders relying on current privacy wrappers or application-layer solutions should plan for migration, as protocol-level changes will supersede or break many legacy privacy abstractions (see GitHub discussions).