The Clear Way Ahead

Reinventing transparency for the age of mistrust.
The blockchain platform for compliance, cybersecurity, IoT trust and information assurance.

Our Whitepapers: General Technical Cryptography
Our Team

Who Are We?

We are a community of passionate individuals who share a common mission: to reinvent transparency for the age of mistrust. Among us are some of the world’s leading experts in cybersecurity, compliance, cryptography, policy, economics and ethics.

Together we are building a blockchain platform and a product ecosystem that combine next-generation innovations in distributed ledger technologies, zero-knowledge proofs, meta-consensus protocols, artificial intelligence, IoT analytics, SaaS functionality and machine learning.

What Problems Are We Solving?

Consider the following four scenarios:

  • An auditor wants to know if a bank’s payment systems are compliant
  • A consumer wants to know that a food retailer’s produce is ethically sourced
  • A judge wants to know if a lawyer’s case-critical evidence has been tampered with
  • A smart city wants to know the real-time state of its IoT devices

Until now, all four scenarios suffer from issues of trust.

Solving Problems
City at Night

How Are We Solving Them?

The IAP’s innovative combination of blockchain technology, zero-knowledge proofs and meta-consensus protocols allow for any of these parties to cryptographically prove the existence of evidence, states or activities to any interested party.

In other words: When there is an issue of trust, the IAP removes the need for it.

Why Does It Matter?

A 2018 Edelman study revealed that trust in politicians and democratic institutions worldwide is at an all time low. A 2018 Accenture study tied an estimated $180 billion in losses to declining trust in businesses among consumers.

Organizations cannot survive without privacy. They cannot sustain trust without transparency. With the IAP’s cutting-edge technology, it is now possible to have both.

Privacy

How Do We Do It?

The IAP’s capabilities derive from four core tools:

CyberTraces

CyberTraces

Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event.

CyberChains

CyberChains

Allow any party to prove the integrity and custody of evidence over time. Third parties can verify these proofs by means of Chains of Custody.

CyberShields

CyberShields

Allows any party to prove that a computer program has been run in good faith without requiring any party to rerun the program or reveal sensitive data.

CyberStates

CyberStates

Report on the internal state of any device, from smartphones to traffic light. This allows any user to prove the historical activity of a device.

The Platform

The infrastructure of the platform consists of four high level components including the Core, Client, Chains and Standard derive from four core tools:

IAP Client

The nodes form the base of the network and facilitate multiple operations, including individual tool and marketplace operations.

IAP Core

Provides distributed redundancy and consensus for security of the entire network, in a fully decentralized and distributed manner, across multiple public blockchains.

IAP Chains

Computational chains that branch from core that does the heavy lifting of the application built to use the network.

IAP Standard

An open standard that will facilitate the creation and interaction of applications that use the platform.

Platform Diagram

Network Verifiers

Network Verifiers receive fees for running the Information Assurance Application nodes (IAA nodes). Each application of the IAP can use these nodes in different ways.

Devices

Devices perform functions and attest and commit to their host device’s state in a way that is publicly verifiable and does not compromise the privacy or confidentiality of the host device.

Validators

Validators can use tokens to receive verification of information assurance attestations from proving entities.

Provers

Provers use tokens to assure validators of their attestations to the same data points, computational output or information assurance attestations.

Data Providers

Data Providers are parties and devices engaged in applications utilizing the IAP that provision data for the consumption of the AI (i.e. iOT-internet of things).

IAP Token Holders

Tokens are used in the security mechanisms for reaching consensus and accurate verification mechanisms.

Code Contributors

Code contributors receive tokens as an incentive for contributing code commits to compatible projects that use the Information Assurance protocol.

Ethical hackers

Ethical hackers can receive tokens for responsibly reporting and disclosing vulnerabilities in applications.

Use Cases

GRC
Governance, risk management and compliance (GRC)
Digital Forensics
Digital Forensics
Intrusion detection and analysis, machine learning and AI
Internet of Things (IoT) Device Monitoring and Control
Disaster Recovery
Disaster Recovery and Data Redundancy
Anti-Deepfake Audio/Video assurance
Change Management
Change Management and Auditing
Ethics & Polycentric Governance Systems and DAO's
Insurtech
Insurtech
Dependency Management
Dependency Management
Continuous Identity and Authentication (+AAA)
Malware Analysis with Machine Learning
Critical Infrastructure State Transition System (RSTS)