verifiable security without single points of failure
Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.
creating the building blocks for provable security
Modern software systems still rely on trust in individuals—maintainers, IT admins, or third-party providers. But what happens when they are compromised? How do you verify that the software running on your systems hasn’t been tampered with?
We’ve identified critical missing pieces needed to remove single points of failure at every level. Our approach starts with how source code is managed, how software is built, and the environments in which it runs.
By combining quorums, applied cryptography, and bit-for-bit reproducibility, we are methodically eliminating trust assumptions, ensuring security isn’t just a claim—it’s provable.
See what we're building →SourceId ensures that source code integrity is verifiable. It prevents tampering of archives and other formats used for delivering source code by standardizing code and generating a hash-based fingerprint of the tree which includes all essential files.
Learn more →
SigRev is a crowdsourcing framework for signed code reviews. It enhances open-source security by making comprehensive manual reviews discoverable, overcoming the limitations of static analysis tools.
Learn more →
StageX is a build toolchain which provides minimalist, reproducible, and multi-signed OCI images for popular software. Bootstrapped fully from source (Stage 0), it ensures your builds are hermetic, deterministic, and reproducible.
Learn more →
ReprOS is a bare-bones unikernel OS designed for maximal isolation and reproducibility. Each build is executed in a temporary VM that is discarded afterward, eliminating persistent risks.
Learn more →
Keyfork simplifies cryptographic material management by deriving for different cryptographic algorithms from a single entropy source. This eliminates manual key handling complexity while maintaining security.
Learn more →
Icepick provides a framework for cryptographic operations while preserving memory boundaries. It enables secure and efficient crypto transactions, including transfers and staking, in a platform-agnostic way.
Learn more →
AirgapOS is a minimal, deterministic Linux unikernel built for secure offline operations. It reduces the attack surface for managing sensitive secrets in an air-gapped environment.
Learn more →
Bootproof cryptographically attests that a server is running the software it claims to be running by leveraging TPM2.
Learn more →
EnclaveOS is a minimal, immutable, and deterministic Linux unikernel tailored for Trusted Execution Environments (TEEs). It enables high-security, verifiable computing for sensitive workloads.
Learn more →
❝Our mission is to use our knowledge to bring open source solutions to the world that improve the security, privacy and freedom of as many individuals as possible. We believe having verifiable foundations that technologies can be built upon are a fundamental step towards improving the well being of our species, and solving the coordination problem.❞
powered by distrust
Companies are already choosing to adopt our methodologies to help secure their systems.
want to help with our vision?
If you would like to help us please sponsor our work or get involved as a contributor.