first-pod_v06_2900x1631_00004.jpg
 

exceptional cybersecurity in the palm of your hand

 

PROBLEM

The wealthiest 200.000 individuals hold more than $27 trillions in assets. Still, they can't buy a device that is more secure than an iPhone, which is regularly hacked even by simple researchers.

business man concerned_1024x1024.jpg

A critical problem for many.

Cybersecurity is a problem for all, but a crucial one for hundreds of thousands of top executives, high net-worth individuals, civil rights activists, and even candidates to political office

globe triangular blue.jpg

Is the World becoming a Hacker Republic?!

While the cybersecurity market has grown 30 times over 10 years to be $260 billions in 2022, the cost of cybercrime will hit $6 trillions the same year. According to Ponemon Institute, over 80% of this cost is due to endpoint security. The average cost is $17 millions per year for an average EU enterprise.

SOLUTION

An ultra-secure 2mm-thin Wifi-enabled portable device.

Via unique transparency and security-review of all critical components, our SeeVik Pod seamlessly delivers radically-unprecedented levels of confidentiality and integrity to your most sensitive communications, negotiations, and financial transactions; all the while firmly preventing criminal abuse.

 
 

Technical Specifications

  • CPU/Chip: Kryptus SCuP CPU. The 1st secure CPU publicly-inspectable in both HW and SW designs.

  • Operating System: L4Re. Open source for 8yrs. Undergoing formal verification. Used in German DoD.

  • Ports: Wi-fi/Bluetooth combo.

  • Display. 600x800 pixels, flexible, highly resistant to breaking and scratching.

  • Chip Fabrication: Lfoundry (Avezzano, Italy). Only independent sub 110nm foundry in EU. Validated in detail our citizen-witness based fabrication oversight.

  • Electronics Manufacturing: JRC. (Seoul, South Korea). Beyond 6-sigma quality. Cofounder Park was co-managing director till 4/2018.

  • Certifications: Our own Trustless Computing Certification Body, as well as Common Criteria EAL 3+ and eIDAS Qualified for compliance.

features

Minimal features and UI enable a stylish, lean and fast user experience, while facilitating security review.

Messaging & Text Editing.jpg

Messaging & Text Editing

Ultra-secure messaging among Pods; in isolated banking advisory, professional or personal environments. Plus: journal, notes manager, one-time password, blog and "social" discussion group.

E-banking & Blockchain.jpg

E-banking & Blockchain

Ultra-secure client to e-banking transactions with partnering banks, and hardware wallet and light client for leading blockchains.

Collaborative Text Editing.jpg

Collaborative Text Editing

Ultra-secure seamless collaborative text co-editing to negotiate highly sensitive agreements, such as contracts, deliberations, deals, mergers, acquisitions, treaties.

Add-ons

Our add-ons provide seamless portability and optimal ergonomics.

 
cover_wallet_02_1200x1200 (00000)_1.jpg

SeeVik Wallet


An ultra-secure digital wallet

Holds the SeeVik Pod with space for 4 cards/ IDs and 15 cash bills. Optimized for ergonomics and durability. Hand-crafted leather woven into carbon fiber. RFID blocking. 
 

 
main-Civic_Case_015_2900x1631_00005 copy.jpg

SeeVik Case for iPhone XS
Style, Ergonomics & Durability

Only 1mm thicker than average iPhone case. Optimized for typing ergonomics. Metal rings protect iPhone rear camera and Pod display. No interference with iPhone sensors. Hand-crafted leather woven into carbon fiber.

 

SeeVik Top
An Ultra-secure SeeVik laptop.

Access Pod features and security on a full keyboard and display. Syncs with your Pod via Wifi. With an 11" display and 13mm thickness, it easily fits in your laptop bag. Wireless charging. No physical ports.

 

Security

We re-conceptualize IT security as the by-product of governance processes. We achieve radically-unprecedented levels of trustworthiness by ensuring that any software, hardware and process - that is critically-involved in the entire lifecycle and supply-chain - will uniquely be:

fsf (1).png

Transparent

Publicly inspectable in software and hardware source designs. All software at OS and lower levels will be free/open source licensed, and publicly developed.

shutterstock_176616410.jpg

Audited

Subject to extreme security-review relative to complexity by highly-proficient and “ethical” experts, down to the CPU, chip fabrication oversight, blockchain, anonymization. 

shutterstock_94093585_citizen_jury02.jpg

Overseen

Subject to highly resilient oversight, including offline citizen-witness for fabrication oversight, and citizen-jury for hosting room, to safeguard versus insiders and abuse of lawful access

tca_Favicon.jpg

Certified

Certified by a new highly accountable and expert Trustless Computing Certification Body, being established by our non-profit arm, the Trustless Computing Association.

 

Product Video

Watch below our newly added 2-minut product video!

Team

A consolidated group of leaders in entrepreneurship, cybersecurity and hardware manufacturing. Supported by resilient supply-chain partnerships.

 

ADVISORS

Decades of top class experience in IT security, marketing, legal, policy.

 

ThoughT Leadership
& Certification Body

TCA_site_banner.jpg

TRUSTLESS.AI is just the tip of an iceberg, of an expanding community, of a movement, that we have been creating with the Trustless Computing Association (TCA).

Over the last 4 years, the Trustless Computing Association has been promoting new standards and open technologies with levels of trustworthiness that are radically beyond state-of-the-art. It has grown through unique  partners and advisors into an active community of world leading experts, consultancies, the largest cyber industry associations, high-assurance open IT leaders, national state security and privacy agencies, and enterprises, around foundational R&D initiatives, a global Free and Safe in Cyberspace  event series, publications and plans for public-private local ecosystems in Rome or Berlin.

Trustless Computing is the long-awaited paradigm shift. The key principle in the Trustless Computing Paradigms is to compute without the need or assumption of unverified trust in anything or anyone, except in the user-assessable technical proficiency, ethical stance and accountability of the organizational processes critically involved in the entire lifecycle of a product or a service.

Trustless Computing requires that all and every software, hardware and processes that are critically involved in the provisioning or lifecycle of a computing service – from high-level software-stack to CPU design to fabrication, to hosting room access – be subject to extreme verification relative to complexity, or to extremely resilient socio-technical oversight.

TCA partners logos all - cropped.jpg

PARTNERSHIP OPPORTUNITIES

 

Join as pilot, channel or strategic partner other pioneering public and private partners that joined us and our non-profit arm Trustless Computing Association to promote SeeVik and its related standards.

 

Founding Partner

COSTS:

  • €20,000 signup, plus €3,000 annually.
  • Contribute 8 hours/month for the next 18 months.

ADVANTAGES:

  • Receive 20 SeeVik Pods and Wallets, with 3 years of full service. Plus a 60% discount for 50 more.
  • Be listed as a Gold Sponsor in all events, including Free and Safe in Cyberspace.
  • Be prominently mentioned as TCA Founding Partner in main communications, co-leading cybersecurity with other world-leading entities.
  • Participate in the iterations of the SeeVik Pods, to ensure it best fits your needs and constraints.

Associate Partner

COSTS:

  • Free of charge.
  • Contribute 8 hours/month for the next 18 months.

ADVANTAGES:

  • Receive 5 SeeVik Pods and Wallets, with 3 years offull service. Plus a 40% discount for up 10 more.
  • Be listed as Bronze Sponsor in events, including Free and Safe in Cyberspace.
  • Be mentioned as TCA Associate Partner in main communications, co-leading cybersecurity with other world-leading entities.
  • Participate in the iterations of the SeeVik Pods and Wallets, to ensure it best fits your needs and constraints.