verifiable security without single points of failure
Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.
creating the building blocks for provable security
Modern software systems still rely on trust in individuals—maintainers, IT admins, or third-party providers. But what happens when they are compromised? How do you verify that the software running on your systems hasn’t been tampered with?
We’ve identified critical missing pieces needed to remove single points of failure at every level. Our approach starts with how source code is managed, how software is built, and the environments in which it runs.
By combining quorums, applied cryptography, and bit-for-bit reproducibility, we are methodically eliminating trust assumptions, ensuring security isn’t just a claim—it’s provable.
See what we're building →SourceId
Problem statement
How does one verify that they are building from the source code they intend? What if someone tampered with code that goes into a .tar archive, or pre-compiled a blob of code and included it in the source code (ref to xz backdoor)
Solution
Standardize code to remove all version control system specific items, leaving only functionality related code and produce a hash based on the tree of all necessary files.
Learn more →
StageX
Problem statement
How does one solve the "Reflections on Trusting Trust" (ref) problem?
Solution
Bootstrap a compiler in a detrministic manner, then use that compiler to build all packages, reproduce the work on different systems, and cryptoraphically sign resulting hashes.
Learn more →
EnclaveOS
Problem statement
Creating immutable, deterministic images for use in secure enclaves is challenging
Solution
A minimal, immutable, and deterministic Linux unikernel build system targeting various Trusted Execution Environments for use cases that require high security and accountability.
Learn more →
❝Our mission is to use our knowledge to bring open source solutions to the world that improve the security, privacy and freedom of as many individuals as possible. We believe having verifiable foundations that technologies can be built upon are a fundamental step towards improving the well being of our species, and solving the coordination problem.❞
powered by distrust
Companies are already choosing to adopt our methodologies to help secure their systems.