The wealthiest 200.000 individuals hold more than $27 trillions in assets. Still, except for a few cases, they can't buy any device that is more secure than an iPhone, which is regularly hacked even by simple researchers.
A critical problem for many.
Cybersecurity is a problem for all, but a crucial one for the most sensitive computing of hundreds of thousands of top executives, high net-worth individuals, wealth managers, activists and politicians.
Is the World becoming a Hacker Republic?!
While the cybersecurity market has grown 30 times over 10 years to $260 billions in 2022, the cost of cybercrime will hit $6 trillions on the same year. According to Ponemon Institute, over 80% of this cost is due to endpoint security. The average cost is $17 millions per year for an average EU enterprise.
An ultra-secure 2mm-thin Wifi-enabled portable device.
We provide executives and high net worth individuals, and the tens of millions of privacy-sensitive persons, a stylish portable device that seamlessly delivers radically-unprecedented security and privacy to their most sensitive everyday computing; all the while solidly enabling only legitimatelawful access.
We do so via unique levels of transparency and security-review of all critical IT life-cycle components and processes, as certified by a new uniquely independent and trustworthy certification body.
CPU/Chip: Kryptus SCuP CPU. The 1st secure-architecture CPU publicly-inspectable in both HW and SW designs. Designed by our cofounder Roberto Gallo. (Exploring RISC-V)
Operating System: KernKonzept L4Re, Germany. Open source for 8yrs. Undergoing formal verification. Used by German DoD.
Chip Fabrication: Lfoundry, Italy. Only independent sub-110nm foundry in EU. Has validated in detail our citizen-witness based fabrication oversight. Has capacity of 50k 300mm wafers per month.
Electronics Manufacturing: JRC, South Korea. Beyond 6-sigma quality. Cofounder Park was co-managing director till 4/2018.
Certifications/Compliance: Incdludes: eIDAS Qualified, GDPR and, most importantly, Trustless Computing Certification Body, being built by our NGO arm to fill a grave lack of adequate IT security certifications.
Ports: Wi-fi/Bluetooth combo.
Display. 600x800 pixels, flexible, highly resistant to breaking and scratching.
Minimal features and UI enable a stylish, lean and fast user experience, while also facilitating security review.
Messaging & Text Editing
Ultra-secure messaging among Pods; in isolated banking advisory, professional or personal environments. Plus: journal, notes manager, one-time password, blog and "social" discussion group.
E-banking & Blockchain
Ultra-secure client to e-banking transactions with partnering banks, as well as hardware wallet and light client for leading blockchains.
Collaborative Text Editing
Ultra-secure seamless collaborative text co-editing to negotiate highly sensitive agreements, such as contracts, deliberations, deals, mergers, acquisitions, treaties.
Our add-ons provide seamless portability and optimal ergonomics.
An ultra-secure digital wallet
Holds the SeeVik Pod with space for 4 cards/ IDs and 15 cash bills. Optimized for ergonomics and durability. Hand-crafted leather woven into carbon fiber. RFID blocking.
SeeVik Case for iPhone XS
Style, Ergonomics & Durability
Only 1mm thicker than average iPhone case. Optimized for typing ergonomics. Metal rings protect iPhone rear camera and Pod display. No interference with iPhone sensors. Hand-crafted leather woven into carbon fiber.
We re-conceptualize IT security as the by-product of governance processes. We achieve radically-unprecedented levels of trustworthiness by ensuring that any software, hardware and process that is critically-involved in the entire lifecycle and supply-chain will uniquely be:
Publicly inspectable in software and hardware source designs. All software at OS and lower levels will be free/open source licensed, and publicly developed.
Subject to extreme security-review relative to complexity by highly-proficient and “ethical” experts, down to the CPU, chip fabrication oversight, blockchain, anonymization.
Subject to highly resilient oversight, including offline citizen-witness for fabrication oversight, and citizen-jury for hosting room, to safeguard versus insiders and abuse of lawful access.
Certified by a new highly accountable and expert Trustless Computing Certification Body, being established by our non-profit arm, the Trustless Computing Association.
A consolidated group of leaders in entrepreneurship, cybersecurity and hardware manufacturing. Supported by resilient supply-chain partnerships.
Decades of top class experience in IT security, marketing, legal, policy.
& Certification Body
Ultimately, 100% of the trustworthyness of our solution derives from its being the first IT device and service compliant to the new Trustless Computing Certification Body. TRUSTLESS.AI is just the tip of an iceberg, of an expanding community, of a movement, that we have been creating with the Trustless Computing Association (TCA).
Over the last 4 years, the Trustless Computing Association has been promoting new standards and open technologies with levels of trustworthiness that are radically beyond state-of-the-art. It has grown through unique partners and advisors into an active community of world leading experts, consultancies, the largest cyber industry associations, high-assurance open IT leaders, national state security and privacy agencies, and enterprises, around foundational R&D initiatives, a global Free and Safe in Cyberspace event series, publications and plans for public-private local ecosystems in Rome or Berlin.
Trustless Computing is the long-awaited paradigm shift. The key principle in the Trustless Computing Paradigms is to compute without the need or assumption of unverified trust in anything or anyone, except in the user-assessable technical proficiency, ethical stance and accountability of the organizational processes critically involved in the entire lifecycle of a product or a service.
Trustless Computing requires that all and every software, hardware and processes that are critically involved in the provisioning or lifecycle of a computing service – from high-level software-stack to CPU design to fabrication, to hosting room access – be subject to extreme verification relative to complexity, or to extremely resilient socio-technical oversight.