Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Private Transaction Relay

A private transaction relay is a network service that accepts transactions and forwards them directly to block builders or validators without broadcasting them to the public peer-to-peer network.
Chainscore © 2026
definition
BLOCKCHAIN PRIVACY

What is Private Transaction Relay?

A private transaction relay is a network service that broadcasts a transaction to a select group of nodes before it is publicly announced on the blockchain, obscuring its origin and preventing front-running.

A private transaction relay is a specialized network service, often called a mempool, that receives a transaction from a user and broadcasts it to a pre-approved set of nodes or validators instead of the public peer-to-peer network. This process delays the transaction's entry into the public view, creating a time advantage that prevents malicious actors from seeing the pending transaction and exploiting its information—a practice known as front-running or MEV (Maximal Extractable Value) extraction. Services like Flashbots Protect and Tornado Cash rely on this principle to offer transaction privacy.

The core mechanism involves a commit-reveal scheme. First, the user submits an encrypted or hashed version of their transaction to the private relay. The relay shares this with its connected validators or miners. Only when a validator is ready to propose the next block does the user reveal the full transaction details, which are then included immediately. This separation of announcement and execution ensures the transaction's content and sender's intent remain hidden from the general network until it is too late for others to react.

Key architectural components include the relay server, which acts as the trusted intermediary, and the searcher or validator network that receives the private flow. These systems often use encrypted channels and require reputation staking or fees to prevent spam. They are critical in DeFi (Decentralized Finance) for large trades, where public broadcast could lead to significant slippage, and in protecting the strategies of arbitrage bots and liquidators.

While enhancing privacy and fairness, private relays introduce centralization concerns, as they rely on a small set of trusted operators. They also create a two-tiered system where users who can pay for or access private relays have a potential advantage over those using the public mempool. This has led to the development of SUAVE (Single Unifying Auction for Value Expression), a decentralized block-building protocol aiming to democratize access to private transaction ordering.

how-it-works
MECHANISM

How a Private Transaction Relay Works

A technical breakdown of the process that shields blockchain transactions from public mempool surveillance.

A private transaction relay is a network service that forwards blockchain transactions through a shielded, off-chain pathway to prevent their details from being exposed in the public mempool before inclusion in a block. Instead of broadcasting a signed transaction directly to the peer-to-peer network—where it is visible to all nodes and can be front-run or sandwich attacked—a user submits it to a specialized relay node. This node, often operated by a service like Flashbots Protect, Taichi Network, or Eden Network, acts as a trusted intermediary, receiving the transaction and holding it in a private, encrypted queue.

The core mechanism relies on a direct, private communication channel between the user's wallet or application and the relay operator. Transactions are typically sent via a secure RPC endpoint or a dedicated API. Once received, the relay validates the transaction (checking nonce, signature, and sufficient gas) and adds it to its private transaction bundle. This bundle is a collection of transactions that the relay will submit directly to block builders or validators, bypassing the public gossip network entirely. Crucially, the transaction details remain confidential within this closed system until they are included in a proposed block.

The final step involves the relay's integration with the block production process. In networks like Ethereum post-EIP-1559, relays often work with MEV-Boost-compatible block builders. The relay packages the private transactions into a bundle and submits it via a secure channel to these builders, who compete to construct the most profitable block. A builder that wins the auction for a given slot will include the private transactions directly in the block they propose to the network validator, at which point the transactions become public on-chain but are already finalized and immune to front-running.

key-features
MECHANICAL PRIMER

Key Features of Private Relays

Private transaction relays are specialized network nodes that decouple transaction submission from user identity, enhancing privacy and censorship resistance. This section details their core operational components.

01

Transaction Decoupling

A private relay decouples the transaction's origin (your wallet) from its public submission point. Instead of broadcasting directly to a public mempool, you send your signed transaction to the relay, which then forwards it to block builders. This breaks the direct, observable link between your IP address and your on-chain activity.

02

Mempool Privacy

Relays prevent your transaction from being visible in the public mempool, where it can be frontrun or sandwiched by predatory bots. By shielding the transaction until it is included in a block, relays protect the intent and potential value of your trade or interaction from being exploited.

03

Censorship Resistance

Relays act as a neutral gateway, making it difficult for centralized entities (like RPC providers or specific nodes) to censor transactions based on origin or content. By providing an alternative submission path, they help uphold network neutrality and permissionless access.

04

Fee Payment Abstraction

Advanced relays support sponsored transactions or account abstraction, allowing a third party (like a dApp) to pay the network gas fees. This abstracts complexity from the end-user and enables seamless onboarding experiences where users don't need to hold the native token for fees.

05

Builder Integration & MEV Protection

Private relays are directly integrated with block builders (e.g., via the builder API). They submit transactions directly to these builders, who construct blocks. This bypasses the public mempool entirely, offering strong protection against Maximal Extractable Value (MEV) strategies like frontrunning.

06

Trust Assumptions & Relay Operators

Using a relay introduces a trust assumption: the relay operator sees your transaction and could, in theory, censor it or leak it. The ecosystem mitigates this through relay diversity (many options) and reputation systems. Users must choose relays with proven operational integrity.

primary-use-cases
PRIVATE TRANSACTION RELAY

Primary Use Cases

Private transaction relay services are primarily used to protect sensitive on-chain activity from front-running, censorship, and surveillance by obfuscating transaction metadata and origin.

06

Regulatory Compliance & Sanctions Screening

Allowing entities to perform OFAC compliance checks or other regulatory screenings before a transaction is broadcast publicly. Specialized relays can validate transactions against blocklists in a private environment, enabling compliant participation in decentralized networks without exposing non-compliant intent.

ecosystem-examples
PRIVATE TRANSACTION RELAY

Ecosystem Examples & Providers

Private transaction relays are specialized services that act as intermediaries, submitting user transactions to the public mempool while obfuscating their origin. This section details the leading providers and their distinct approaches to transaction privacy.

05

Key Architectural Models

Private relays operate under different trust and architectural models, which define their security and decentralization properties.

  • Trusted Relay Model: A centralized entity operates the relay (common for early providers).
  • Decentralized Relay Network: A permissionless set of nodes run the service (e.g., Taichi).
  • Staked/Slashed Relay: Operators stake collateral that can be slashed for misbehavior (e.g., Eden).
  • PBS (Proposer-Builder Separation) Integration: Relays connect directly to block builders in an MEV-Boost auction.
06

Wallet & RPC Integration

End-user access to private relays is primarily through wallet RPC (Remote Procedure Call) configuration. This is how privacy becomes a user-facing feature.

  • Custom RPC Endpoints: Users manually add a relay's RPC URL to their wallet (e.g., https://rpc.flashbots.net).
  • Built-in Wallet Features: Wallets like MetaMask and Rabby integrate relays like Flashbots Protect into their UI.
  • Bundler Services: For account abstraction (ERC-4337), specialized bundlers often integrate private relays to protect user operations.
TRANSACTION SUBMISSION PATHS

Public Mempool vs. Private Relay: A Comparison

A comparison of the core characteristics of submitting transactions to a public mempool versus using a private transaction relay service.

FeaturePublic MempoolPrivate Relay

Transaction Visibility

Public to all network participants

Visible only to the relay and selected builders

Front-Running Risk

Transaction Ordering Control

Determined by miners/validators

Guaranteed by the relay service

Submission Latency

Propagates peer-to-peer

Direct, private connection

MEV Extraction Vulnerability

Typical Cost

Base network gas fee only

Base gas fee + relay service fee

Censorship Resistance

High (decentralized propagation)

Lower (centralized relay point)

Common Use Cases

General transactions

Arbitrage, large trades, NFT mints

security-considerations
PRIVATE TRANSACTION RELAY

Security & Trust Considerations

Private transaction relays are third-party services that forward user transactions to block builders, introducing new security and trust vectors distinct from the underlying blockchain.

01

Censorship Resistance

A relay can choose to censor transactions by refusing to include them in a block. This creates a central point of failure for transaction inclusion, potentially blocking transactions from certain addresses or containing specific data. The relay's inclusion policy is a critical, often opaque, trust assumption.

  • Example: A relay could blacklist transactions interacting with a sanctioned smart contract.
  • Mitigation: Users can broadcast to multiple relays or use mev-boost with a diverse set of relay operators.
02

Validator Trust Assumption

Validators using a relay must trust it to provide a valid block header and a full block body that matches. This is a cryptoeconomic trust issue: if a relay provides an invalid block body, the validator signs an invalid header and may be slashed. The relay's software integrity and operational security are paramount.

  • Risk: A compromised or malicious relay could cause validators to sign for unavailable or incorrect blocks.
  • Verification: Some relays provide proofs of block body availability (e.g., via Data Availability Sampling) to reduce this trust.
03

MEV Extraction & Fairness

Relays are a key player in the MEV supply chain. They receive transaction bundles from searchers and choose which ones to forward to validators. This gives them significant power over:

  • Transaction ordering within the block.
  • Extracted value distribution between searchers, validators, and users.
  • Front-running and sandwich attack prevention.

A relay's auction mechanism and proposer payment (tip) routing policies directly impact market fairness.

04

Data Privacy & Leakage

Sending a transaction to a relay exposes its content before it is publicly on-chain. This creates a front-running risk if the relay or its connected builders are malicious. While the transaction payload may be encrypted, metadata (sender, gas, timing) is still visible.

  • Threat: A relay could leak transaction details to affiliated searchers.
  • Solution: Protocols like SUAVE aim to decentralize this function, and encrypted mempools (e.g., using threshold encryption) are an active area of research.
05

Relay Centralization Risks

The relay landscape can become concentrated, with a few dominant operators processing most blocks. This creates systemic risk:

  • Single point of failure: Technical outages at a major relay can disrupt block production.
  • Collusion: Dominant relays could coordinate to enforce policies network-wide.
  • Governance attack vector: Control over relay software becomes a high-value target.

Client diversity among validators in their relay choices is crucial for network health.

06

Verification & Transparency

To minimize trust, the relay's operations should be verifiable. Key mechanisms include:

  • Public Attestations: Relays can publicly commit to their received blocks and bids.
  • Open Source Software: Relay client code should be auditable.
  • Performance Metrics: Public data on relay uptime, censorship metrics, and inclusion latency.
  • Registries: Lists like the Ethereum Relay Registry help validators assess relay reputation and compliance with policies like OFAC sanctions.
PRIVATE TRANSACTION RELAY

Common Misconceptions

Clarifying persistent myths and misunderstandings about how private transaction relays operate, their security guarantees, and their role in the broader blockchain ecosystem.

No, private transactions are not anonymous; they are confidential. Private transaction relays like Flashbots Protect, BloxRoute, or Taichi Network obscure transaction details from the public mempool to prevent frontrunning and MEV extraction, but the transaction data is still visible to the relay operators, block builders, and validators. This creates a trusted third-party model. True anonymity, where the origin and content of a transaction are hidden from all parties, requires cryptographic techniques like zero-knowledge proofs, which are not the primary function of standard private relays.

PRIVATE TRANSACTION RELAY

Technical Details & Mechanics

Private transaction relay systems are specialized networks designed to obscure transaction details from public view before they are submitted to a blockchain. This section explains the core mechanisms, protocols, and trade-offs involved in achieving transaction privacy.

Private transaction relay is a network architecture that allows users to send transactions through a private, encrypted channel to specialized nodes (relayers) before they are publicly broadcast to the blockchain. It works by encrypting the raw transaction data, sending it to a trusted or decentralized relay network, which then decrypts and submits it to the public mempool. This process obscures the transaction's origin (IP address) and details from general network surveillance until the moment of submission, helping to prevent frontrunning and protect user privacy. Key components include the relayer (the submitting node), the user who signs the transaction, and often a payment-for-relay mechanism like a fee auction.

PRIVATE TRANSACTION RELAY

Frequently Asked Questions (FAQ)

Essential questions and answers about private transaction relay networks, which protect user transaction data from public mempool exposure.

A private transaction relay is a network that submits transactions directly to block builders or validators, bypassing the public mempool to prevent front-running and MEV extraction. It works by encrypting a transaction and sending it through a private channel, such as a p2p network or a dedicated RPC endpoint, to a trusted builder who includes it in the next block. This process, often called a dark pool or private mempool, obscures transaction details like the amount, recipient, and smart contract interaction from public view until the block is proposed, protecting users from predatory bots.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Private Transaction Relay: Definition & How It Works | ChainScore Glossary | ChainScore Labs