Who Are We?
We are a community of passionate individuals who share a common mission:
To reinvent transparency for the age of mistrust. Among us are some of the world’s leading experts in cybersecurity, compliance, cryptography, policy, economics and ethics, including multiple serial entrepreneurs, the CEOs of major accounting, audit, media and forensic firms, an ethics professor, an advisory board member of the National Institute of Standards and Technology and a policy advisor for the UK Government.
Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data.
Allow any party to prove the integrity and custody of evidence over time. Third parties, such as auditors, assessors, supply chain managers and legal authorities, can verify these proofs by means of Chains of Custody (CoC). As with CyberTraces, the prover retains full control over the privacy and confidentiality of the original data.
Allows any party to prove that a computer program has been run in good faith without requiring any party to rerun the program or reveal sensitive data. It employs a variety of next-generation zero-knowledge proofs and underwrites all other IAP tools.
Report on the internal state of any device, from smartphones to traffic light. This allows any user to prove the historical activity of a device, and for IoT devices to trust each other. In combination with other IAP tools, CyberStates can automatically ensure the real-time functional integrity of any connected system, from a smart home to a smart city.
Governance, risk management and compliance (GRC)
Intrusion detection and analysis, machine learning and AI
Internet of Things (IoT) Device Monitoring and Control
Disaster Recovery and Data Redundancy
Anti-Deepfake Audio/Video assurance
Change & Dependency Management and Auditing
Ethics & Polycentric Governance Systems and DAO's
Continuous Identity and Authentication (+AAA)
Malware Analysis with Machine Learning
Critical Infrastructure State Transition System (RSTS)
Cayman Enterprise City, P.O. Box 2510
Grand Cayman KY1-1104