The Clear Way Ahead
Reinventing transparency for the age of mistrust.
The blockchain platform for compliance, cybersecurity, IoT trust and information assurance.
Who Are We?

We are a community of passionate individuals who share a common mission: to reinvent transparency for the age of mistrust. Among us are some of the world’s leading experts in cybersecurity, compliance, cryptography, policy, economics and ethics, including multiple serial entrepreneurs, the CEOs of major accounting, audit, media and forensic firms, an ethics professor, an advisory board member of the National Institute of Standards and Technology and a policy advisor for the UK Government.

Together we are building a blockchain platform and a product ecosystem that combine next-generation innovations in distributed ledger technologies, zero-knowledge proofs, meta-consensus protocols, artificial intelligence, IoT analytics, SaaS functionality and machine learning to solve some of the worlds biggest challenges. With eight commercial partners already building products on the platform and several others adapting the platform to existing products, we are just getting started.

What Problems Are We Solving?

Consider the following four scenarios:

  • An auditor wants to know if a bank’s payment systems are compliant
  • A consumer wants to know that a food retailer’s produce is ethically sourced
  • A judge wants to know if a lawyer’s case-critical evidence has been tampered with
  • A smart city wants to know the real-time state of its IoT devices

Until now, all four scenarios suffer from issues of trust:

  • A bank can alter evidence to fake historical compliance
  • A food retailer can obscure fact with clever marketing
  • A lawyer can cover up any traces of tampering
  • A corrupted IoT device can transmit faulty information about its state

Moreover, all of these cases are vulnerable to human error.

How Are We Solving Them?

The IAP’s innovative combination of blockchain technology, zero-knowledge proofs and meta-consensus protocols allow for any of these parties to cryptographically prove the existence of evidence, states or activities to any interested party. Moreover, they allow for complete transparency without sacrificing the privacy of sensitive data.

In other words: When there is an issue of trust, the IAP removes the need for it.

While the technology is optimised for security and efficiency, the range of possible applications reaches to almost every facet of society. The IAP can help individuals, start-ups, SMEs, Blue Chip companies, legal firms, consultants, DAOs, NGOs and governments with trust and transparency challenges related to the existence of data, evidence, IoT states, series of events, chains of custody and states of affairs, both historically and in real time, while always giving the user full control over privacy.

Why Does It Matter?

A 2018 Edelman study revealed that trust in politicians and democratic institutions worldwide is at an all time low. A 2018 Accenture study tied an estimated $180 billion in losses to declining trust in businesses among consumers. A 2018 Nielsen study highlighted that 80% of consumers care deeply about whether and how corporations are tackling sustainability issues.

Within the enterprise, cybercrime damages cost $6 trillion annually, up from £3 trillion in 2015. $80 billion is spent globally on governance, risk and compliance and is forecasted to reach £120 billion within three years. The information assurance industry alone was worth $3.53 billion in 2017: forecasts estimate that this will reach £5.48 billion by 2023.

Organizations cannot survive without privacy. They cannot sustain trust without transparency. With the IAP’s cutting-edge technology, it is now possible to have both

How Do We Do It?
The IAP’s capabilities derive from four core tools:
Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data.
Allow any party to prove the integrity and custody of evidence over time. Third parties, such as auditors, assessors, supply chain managers and legal authorities, can verify these proofs by means of Chains of Custody (CoC). As with CyberTraces, the prover retains full control over the privacy and confidentiality of the original data.
Allows any party to prove that a computer program has been run in good faith without requiring any party to rerun the program or reveal sensitive data. It employs a variety of next-generation zero-knowledge proofs and underwrites all other IAP tools.
Report on the internal state of any device, from smartphones to traffic light. This allows any user to prove the historical activity of a device, and for IoT devices to trust each other. In combination with other IAP tools, CyberStates can automatically ensure the real-time functional integrity of any connected system, from a smart home to a smart city
The Platform
The infrastructure of the platform consists of four high level components including the Core, Client, Chains and Standard derive from four core tools:

IAP Client

The nodes form the base of the network and facilitate multiple operations, including individual tool and marketplace operations.

IAP Core

Provides distributed redundancy and consensus for security of the entire network, in a fully decentralized and distributed manner, across multiple public blockchains.

IAP Chains

Computational chains that branch from core that does the heavy lifting of the application built to use the network.

IAP Standard

An open standard that will facilitate the creation and interaction of applications that use the platform.
Use Cases
Governance, risk management and compliance (GRC)
Digital Forensics
Intrusion detection and analysis, machine learning and AI
Internet of Things (IoT) Device Monitoring and Control
Disaster Recovery and Data Redundancy