Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Comparisons

Private Computation Oracles: DECO vs Town Crier

A technical comparison for CTOs and architects evaluating privacy-preserving oracles. Analyzes Chainlink's DECO (zero-knowledge proofs) and Town Crier (trusted execution environments) across security models, performance, and integration complexity.
Chainscore © 2026
introduction
THE ANALYSIS

Introduction: The Privacy Oracle Problem

A comparison of two foundational approaches to securely and privately fetching off-chain data for smart contracts.

DECO (Decentralized Oracle) excels at client-side privacy by using zero-knowledge proofs (ZKPs) to verify web data without revealing the raw query or response to the oracle network. For example, a user can prove their credit score exceeds 700 for a loan application without exposing the actual score. This leverages the TLS 1.3 protocol for secure sessions, enabling verification of data from any HTTPS website, a significant architectural advantage for broad compatibility.

Town Crier takes a different approach by relying on trusted execution environments (TEEs), specifically Intel SGX. This hardware-based enclave acts as a single, highly secure attestable source of truth. This results in a performance trade-off: TEEs enable high-throughput, low-latency data delivery without the computational overhead of ZKPs, but introduce a hardware dependency and potential centralization around the security of the specific TEE implementation.

The key trade-off: If your priority is maximizing data source flexibility and minimizing trust in hardware vendors, choose DECO. Its ZKP-based, protocol-level verification is more decentralized by design. If you prioritize high performance and lower operational complexity for verified data from specific, high-value feeds, choose Town Crier. Its TEE-based model offers superior speed for applications where the enclave's attestation provides sufficient trust guarantees.

tldr-summary
Private Computation Oracles

TL;DR: Core Differentiators

Key architectural and trust trade-offs between DECO and Town Crier for confidential data verification.

01

DECO: Trustless Privacy via ZKPs

Zero-Knowledge Proof Architecture: Uses cryptographic proofs to verify web data without revealing the raw data or the server's TLS key. This eliminates the need to trust the oracle node with sensitive information.

Matters for: High-stakes DeFi where data authenticity and user privacy are paramount, such as verifying KYC credentials or private financial records from a bank API.

02

DECO: Broad Web Compatibility

Works with Any TLS 1.3 Server: Can attest to data from standard HTTPS websites without requiring server-side modifications. This massively expands the pool of usable data sources.

Matters for: Protocols needing data from legacy or permissioned systems (e.g., corporate earnings reports, government databases) where you cannot install custom software.

03

Town Crier: High-Performance TEEs

Hardware-Enforced Confidentiality: Relies on Intel SGX Trusted Execution Environments (TEEs) to create a secure, isolated enclave for computation. This provides high-speed verification with low latency.

Matters for: Applications requiring real-time or high-frequency data feeds (e.g., DEX price oracles, prediction markets) where proof generation overhead is prohibitive.

04

Town Crier: Simplified Trust Model

Trusted Hardware, Not Cryptography: Shifts trust from complex cryptographic assumptions to the integrity of Intel's hardware and remote attestation. This can simplify the initial security audit surface.

Matters for: Teams prioritizing development speed and computational efficiency for less sensitive data, accepting the trust assumptions in hardware manufacturers and the attestation process.

PRIVATE COMPUTATION ORACLE PROTOCOLS

Feature Comparison: DECO vs Town Crier

Direct comparison of key architectural and performance metrics for private data oracle solutions.

Metric / FeatureDECO (Chainlink)Town Crier (Cornell)

Privacy Foundation

TLS-based Proofs

Intel SGX Enclaves

Data Source Compatibility

Any TLS 1.2+ Web Server

SGX-Compatible Servers Only

Trust Assumption

Trusted Hardware Not Required

Trust in Intel SGX & Remote Attestation

Primary Use Case

Private Data Feeds (e.g., Credit Scores)

Secure Off-Chain Computation

Integration Layer

Chainlink Oracle Network

Direct Smart Contract Integration

Active Development Status

false (Research Prototype)

Production Deployment

Chainlink Mainnet

Ethereum Testnet (Ropsten)

pros-cons-a
PRIVATE COMPUTATION ORACLES

DECO (Chainlink): Pros and Cons

Comparing Chainlink's DECO and Town Crier for confidential off-chain data verification. Key strengths and trade-offs at a glance.

01

DECO: Protocol-Agnostic Design

Specific advantage: Built on standard TLS, enabling privacy proofs for any HTTPS-enabled web service. This matters for enterprise integrations where data sources like Bloomberg, SWIFT, or corporate APIs cannot be modified to support custom attestation protocols.

02

DECO: Zero-Knowledge Privacy

Specific advantage: Uses zk-SNARKs to prove data came from a specific TLS session without revealing the raw data. This matters for DeFi credit scoring or KYC verification where sensitive personal or financial data must remain confidential on-chain.

03

Town Crier: Hardware-Based Security

Specific advantage: Leverages Intel SGX trusted execution environments (TEEs) for attestation. This matters for achieving high-throughput, low-latency proofs where zk-proof computational overhead is prohibitive, such as real-time market data feeds.

04

Town Crier: Mature Research & Simplicity

Specific advantage: Based on peer-reviewed academic research with a simpler trust model centered on TEE integrity. This matters for rapid prototyping or use cases where the threat model accepts the security of hardware enclaves over more complex cryptographic setups.

05

DECO: Trust Minimization Trade-off

Specific con: Relies on the security of TLS and the Certificate Authority system. This is a concern for long-term, high-value settlements where CA compromises or protocol-level vulnerabilities could invalidate historical proofs.

06

Town Crier: Centralization & Hardware Risk

Specific con: Security is contingent on Intel's SGX and a single attestation server (in the reference design). This matters for permissionless, decentralized applications where reliance on a specific hardware vendor and potential side-channel attacks are unacceptable risks.

pros-cons-b
PRIVATE COMPUTATION ORACLES

Town Crier vs DECO: Pros and Cons

Key architectural trade-offs for CTOs evaluating privacy-preserving data feeds. DECO uses zero-knowledge proofs, while Town Crier leverages trusted execution environments (TEEs).

02

Town Crier: Lower On-Chain Cost

Minimizes on-chain verification overhead: The TEE produces a succinct attestation, not a complex cryptographic proof. This results in lower gas fees for the final on-chain verification step compared to ZK-based systems. This matters for protocols requiring frequent, low-latency data updates on Ethereum mainnet.

04

DECO: No Hardware Trust Assumption

Relies on cryptographic guarantees, not hardware vendors: Removes the trusted computing base of a specific TEE manufacturer (e.g., Intel). This matters for maximally decentralized and censorship-resistant applications where the threat model includes hardware backdoors or future enclave vulnerabilities.

05

Town Crier: Single Point of Failure

Centralized TEE operator risk: The system depends on the integrity and liveness of the specific SGX enclave operator. A compromised or offline enclave halts the service. This matters for mission-critical DeFi protocols that require 24/7 uptime and robust decentralization.

06

DECO: Higher Computational & Gas Cost

ZK proof generation is computationally intensive: Creating proofs for complex queries can be slow and expensive, leading to higher latency and significantly higher on-chain verification gas costs. This matters for high-frequency data feeds or applications with tight latency budgets.

PRIVATE COMPUTATION ORACLES

Technical Deep Dive: Security Models

DECO and Town Crier are foundational protocols for privacy-preserving oracle services, but they employ fundamentally different security models. This comparison breaks down their core mechanisms, trust assumptions, and ideal use cases for CTOs and architects.

DECO relies on cryptographic zero-knowledge proofs (ZKPs), while Town Crier relies on hardware-based trusted execution environments (TEEs). DECO uses TLS-based ZKPs to prove a web server's response is correct without revealing the data, minimizing trust. Town Crier uses an Intel SGX enclave to create a secure, isolated environment for fetching and attesting to data, placing trust in Intel's hardware and remote attestation.

CHOOSE YOUR PRIORITY

When to Use Which: Decision by Use Case

DECO for DeFi & Identity

Verdict: The superior choice for privacy-preserving identity and creditworthiness proofs. Strengths: DECO's core innovation is allowing users to prove statements about private web data (e.g., bank balances, KYC status) without revealing the underlying data. This is ideal for under-collateralized lending, private credit scoring, and selective KYC for DeFi protocols like Aave or Compound. It enables new financial primitives by bringing verifiable off-chain reputation on-chain privately. Considerations: Integration is more complex, requiring a client-side component (the prover) and a server-side TLS oracle. Best for applications where user data privacy is non-negotiable.

Town Crier for DeFi & Identity

Verdict: A strong fit for authenticated data feeds where the source's integrity, not the user's privacy, is key. Strengths: Town Crier excels at providing cryptographically attested data from HTTPS websites to smart contracts via Intel SGX. This is perfect for bringing traditional financial data (e.g., authenticated stock prices from Bloomberg, verified exchange rates) into DeFi for synthetic assets or oracle price feeds. The security guarantee is about the data's origin, not hiding it. Considerations: Does not provide the same user-centric privacy proofs as DECO. The data is revealed to the enclave and, by design, to the contract.

verdict
THE ANALYSIS

Final Verdict and Decision Framework

A direct comparison of DECO and Town Crier's architectural trade-offs to guide your private oracle selection.

DECO excels at client-side privacy and scalability because it uses zero-knowledge proofs (ZKPs) to cryptographically prove the authenticity of data from any TLS-enabled server without revealing the raw data or the server's identity. For example, a DeFi protocol can verify a user's credit score from a traditional API without the oracle or the blockchain ever seeing the sensitive score itself. This model inherently scales with user count, as proof generation is distributed.

Town Crier takes a different approach by relying on trusted execution environments (TEEs), specifically Intel SGX. This results in a performance and simplicity trade-off. A Town Crier attestation can fetch and deliver private data in milliseconds, making it suitable for high-frequency use cases. However, it centralizes trust in Intel's hardware and its remote attestation proofs, creating a single point of failure and ongoing security audits for side-channel attacks.

The key architectural divergence: DECO provides cryptographic privacy with no trusted hardware, ideal for applications requiring maximal censorship resistance and data minimization, like private identity attestations or selective KYC. Town Crier offers low-latency performance and easier integration with existing APIs, better suited for private price feeds or real-time event data where speed is critical and hardware trust is an acceptable model.

Consider DECO if your priority is decentralized trust and data minimization for user-centric applications. Its ZKP-based model aligns with the ethos of self-sovereign data, though it imposes higher computational overhead on the user's device. Choose Town Crier when your priority is high throughput and low latency for protocol-centric data feeds, and your threat model accepts the security assumptions of Intel SGX and a more centralized relay infrastructure.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team