{%- include head.html -%} {%- include header.html -%}
roadmap

verifiable security without single points of failure


Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.

creating the building blocks for provable security

Modern software systems still rely on trust in individuals—maintainers, IT admins, or third-party providers. But what happens when they are compromised? How do you verify that the software running on your systems hasn’t been tampered with?

We’ve identified critical missing pieces needed to remove single points of failure at every level. Our approach starts with how source code is managed, how software is built, and the environments in which it runs.

By combining quorums, applied cryptography, and bit-for-bit reproducibility, we are methodically eliminating trust assumptions, ensuring security isn’t just a claim—it’s provable.

See what we're building
SourceId
 | 
source code integrity
backlog

SourceId ensures that source code integrity is verifiable. It prevents tampering of archives and other formats used for delivering source code by standardizing code and generating a hash-based fingerprint of the tree which includes all essential files.


Learn more
SigRev
 | 
crowdsourced code review
backlog

SigRev is a crowdsourcing framework for signed code reviews. It enhances open-source security by making comprehensive manual reviews discoverable, overcoming the limitations of static analysis tools.


Learn more
StageX
 | 
deterministic reproducibility
ready

StageX is a build toolchain which provides minimalist, reproducible, and multi-signed OCI images for popular software. Bootstrapped fully from source (Stage 0), it ensures your builds are hermetic, deterministic, and reproducible.


Learn more
ReprOS
 | 
ephemeral build environments
in-progress

ReprOS is a bare-bones unikernel OS designed for maximal isolation and reproducibility. Each build is executed in a temporary VM that is discarded afterward, eliminating persistent risks.


Learn more
Keyfork
 | 
deterministic key management
ready

Keyfork simplifies cryptographic material management by deriving for different cryptographic algorithms from a single entropy source. This eliminates manual key handling complexity while maintaining security.


Learn more
Icepick
 | 
cryptographic operations
ready

Icepick provides a framework for cryptographic operations while preserving memory boundaries. It enables secure and efficient crypto transactions, including transfers and staking, in a platform-agnostic way.


Learn more
AirgapOS
 | 
air-gapped OS
ready

AirgapOS is a minimal, deterministic Linux unikernel built for secure offline operations. It reduces the attack surface for managing sensitive secrets in an air-gapped environment.


Learn more
Bootproof
 | 
remote attestation
backlog

Bootproof cryptographically attests that a server is running the software it claims to be running by leveraging TPM2.


Learn more
EnclaveOS
 | 
trusted execution environments
in-progress

EnclaveOS is a minimal, immutable, and deterministic Linux unikernel tailored for Trusted Execution Environments (TEEs). It enables high-security, verifiable computing for sensitive workloads.


Learn more

❝Our mission is to use our knowledge to bring open source solutions to the world that improve the security, privacy and freedom of as many individuals as possible. We believe having verifiable foundations that technologies can be built upon are a fundamental step towards improving the well being of our species, and solving the coordination problem.❞

powered by distrust

Companies are already choosing to adopt our methodologies to help secure their systems.

ready to take your security to the next level?

We help organizations that can't afford to fail. If security is mission-critical for your company, let's talk.

{%- include footer.html -%}