# Use Cases

### 1. Confidential Transactions

Send and receive private tokens securely

Traditional blockchains expose every transaction and balance on-chain.\
With COTI V2, users can send and receive tokens privately, where transaction amounts, participants, and balances remain fully encrypted while preserving verifiability on the blockchain.

Secure tokenization becomes feasible, enabling the exchange of assets while protecting the confidentiality of transaction details.

![](https://2557786554-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeC83qbrBhITO4kE7kTNB%2Fuploads%2FJvf3fm05EzInc4i8vEWJ%2Funknown.png?alt=media\&token=4a142f78-5334-432a-ab2b-2f958d5a98b5)

<br>

Demo Video:[ Watch on YouTube →<br>](https://youtu.be/HwkWEQX0n94)(Shows private token transfer between wallets using COTI V2’s confidential transaction layer.)

Why it matters

* Protects user and business financial data
* Enables compliant, private settlements
* Supports any ERC-20-style token deployed on COTI<br>

### 2. Confidential DeFi

Privex: A Perpetual DEX with privacy built-in

DeFi transformed finance — but its radical transparency comes with risks.\
On-chain positions, liquidations, and strategies are visible to everyone, deterring institutional use and automated trading strategies.

COTI V2 enables confidential DeFi: all trades, positions, and settlement data remain encrypted while still verifiable. This ensures compliance readiness while safeguarding user privacy.

![](https://2557786554-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeC83qbrBhITO4kE7kTNB%2Fuploads%2FXSzbeYNUlsddY9rKRRyR%2Funknown.png?alt=media\&token=692daf6f-92ae-4a35-b811-6bee0446ca09)

Demo:[ Watch on X (Twitter) →](https://www.youtube.com/watch?v=6dVypDtk9VY)

Why it matters

* Enables institutional participation in DeFi
* Protects trading strategies and portfolio data
* Retains transparency through auditable proofs
* Complies with evolving regulatory frameworks\ <br>

### 3. Private Voting

Confidential voting and governance

COTI’s privacy infrastructure powers secure, verifiable, and anonymous voting — ideal for DAOs, enterprises, or even public governance.\
Votes are cast privately, encrypted end-to-end, and tallied without exposing voter identities or individual choices.

Confidential voting systems maintain the integrity of elections by preserving the privacy of voters’ decisions.

![](https://2557786554-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FeC83qbrBhITO4kE7kTNB%2Fuploads%2Fyz2HOM1NGW7QqnrWrDFN%2Funknown.png?alt=media\&token=dc039268-be07-44a1-b5c8-dc726c5e6fae)

Demo:[ Watch on YouTube →](https://www.youtube.com/watch?v=_RKEkR1KUOA\&list=PLQ1p4uxJCOysr2U-53II0Vxvwe8SS2qI1\&index=5)

Why it matters

* Prevents coercion and vote manipulation
* Verifiable yet private vote tallying
* Applicable for DAOs, corporate boards, and communities

<br>

### More to Come

These are just the first applications powered by COTI V2’s confidential computing stack.\
The same privacy layer can be integrated into:

* Private stablecoins
* Confidential identity and credential systems


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.coti.io/coti-documentation/how-coti-works/introduction/use-cases.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
