The Clear Way Ahead
The blockchain platform for
Our Whitepapers General Technical Cryptography
Get StartedWho Are We?
We are a community of passionate individuals who share a common mission:
To reinvent transparency for the age of mistrust. Among us are some of the world’s leading experts in cybersecurity, compliance, cryptography, policy, economics and ethics, including multiple serial entrepreneurs, the CEOs of major accounting, audit, media and forensic firms, an ethics professor, an advisory board member of the National Institute of Standards and Technology and a policy advisor for the UK Government.

How Do We Do It?
The IAP’s capabilities derive from four core tools
CyberTraces
Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data.
CyberChains
Allow any party to prove the integrity and custody of evidence over time. Third parties, such as auditors, assessors, supply chain managers and legal authorities, can verify these proofs by means of Chains of Custody (CoC). As with CyberTraces, the prover retains full control over the privacy and confidentiality of the original data.
CyberShields
Allows any party to prove that a computer program has been run in good faith without requiring any party to rerun the program or reveal sensitive data. It employs a variety of next-generation zero-knowledge proofs and underwrites all other IAP tools.
CyberStates
Report on the internal state of any device, from smartphones to traffic light. This allows any user to prove the historical activity of a device, and for IoT devices to trust each other. In combination with other IAP tools, CyberStates can automatically ensure the real-time functional integrity of any connected system, from a smart home to a smart city.
The Platform
The infrastructure of the platform consists of four high level components including the Core, Client, Chains and Standard derive from four core tools












Use Cases
Governance, risk management and compliance (GRC)
Digital Forensics
Intrusion detection and analysis, machine learning and AI
Internet of Things (IoT) Device Monitoring and Control
Disaster Recovery and Data Redundancy
Anti-Deepfake Audio/Video assurance
Change & Dependency Management and Auditing
Ethics & Polycentric Governance Systems and DAO's
Insurtech
Continuous Identity and Authentication (+AAA)
Malware Analysis with Machine Learning
Critical Infrastructure State Transition System (RSTS)
Contact
Address
Cayman Enterprise City, P.O. Box 2510
Grand Cayman KY1-1104
Email Us
team@iap.network
community@iap.network