The wealthiest 200.000 individuals hold more than $27 trillions in assets. Still, they can't buy a device that is more secure than an iPhone, which is regularly hacked even by simple researchers.
A critical problem for many.
Cybersecurity is a problem for all, but a crucial one for hundreds of thousands of top executives, high net-worth individuals, civil rights activists, and even candidates to political office.
Is the World becoming a Hacker Republic?!
While the cybersecurity market has grown 30 times over 10 years to be $260 billions in 2022, the cost of cybercrime will hit $6 trillions the same year. According to Ponemon Institute, over 80% of this cost is due to endpoint security. The average cost is $17 millions per year for an average EU enterprise.
An ultra-secure 2mm-thin Wifi-enabled portable device.
Via unique transparency and security-review of all critical components, our SeeVik Pod seamlessly delivers radically-unprecedented levels of confidentiality and integrity to your most sensitive communications, negotiations, and financial transactions; all the while firmly preventing criminal abuse.
CPU/Chip: Kryptus SCuP CPU. The 1st secure CPU publicly-inspectable in both HW and SW designs. Designd by our cofounder Roberto Gallo.
Operating System: KernKonzept L4Re. Open source for 8yrs. Undergoing formal verification. Used by German DoD.
Chip Fabrication: Lfoundry. Only independent sub-110nm foundry in EU. Has validated in detail our citizen-witness based fabrication oversight. Has capacity of 50k 300mm wafers per month.
Electronics Manufacturing: JRC. (Seoul, South Korea). Beyond 6-sigma quality. Cofounder Park was co-managing director till 4/2018.
Certifications: Trustless Computing Certification Body, Common Criteria EAL 3+, and eIDAS Qualified
Ports: Wi-fi/Bluetooth combo.
Display. 600x800 pixels, flexible, highly resistant to breaking and scratching.
Minimal features and UI enable a stylish, lean and fast user experience, while facilitating security review.
Messaging & Text Editing
Ultra-secure messaging among Pods; in isolated banking advisory, professional or personal environments. Plus: journal, notes manager, one-time password, blog and "social" discussion group.
E-banking & Blockchain
Ultra-secure client to e-banking transactions with partnering banks, and hardware wallet and light client for leading blockchains.
Collaborative Text Editing
Ultra-secure seamless collaborative text co-editing to negotiate highly sensitive agreements, such as contracts, deliberations, deals, mergers, acquisitions, treaties.
Our add-ons provide seamless portability and optimal ergonomics.
An ultra-secure digital wallet
Holds the SeeVik Pod with space for 4 cards/ IDs and 15 cash bills. Optimized for ergonomics and durability. Hand-crafted leather woven into carbon fiber. RFID blocking.
SeeVik Case for iPhone XS
Style, Ergonomics & Durability
Only 1mm thicker than average iPhone case. Optimized for typing ergonomics. Metal rings protect iPhone rear camera and Pod display. No interference with iPhone sensors. Hand-crafted leather woven into carbon fiber.
We re-conceptualize IT security as the by-product of governance processes. We achieve radically-unprecedented levels of trustworthiness by ensuring that any software, hardware and process - that is critically-involved in the entire lifecycle and supply-chain - will uniquely be:
Publicly inspectable in software and hardware source designs. All software at OS and lower levels will be free/open source licensed, and publicly developed.
Subject to extreme security-review relative to complexity by highly-proficient and “ethical” experts, down to the CPU, chip fabrication oversight, blockchain, anonymization.
Subject to highly resilient oversight, including offline citizen-witness for fabrication oversight, and citizen-jury for hosting room, to safeguard versus insiders and abuse of lawful access.
Certified by a new highly accountable and expert Trustless Computing Certification Body, being established by our non-profit arm, the Trustless Computing Association.
A consolidated group of leaders in entrepreneurship, cybersecurity and hardware manufacturing. Supported by resilient supply-chain partnerships.
Decades of top class experience in IT security, marketing, legal, policy.
& Certification Body
TRUSTLESS.AI is just the tip of an iceberg, of an expanding community, of a movement, that we have been creating with the Trustless Computing Association (TCA).
Over the last 4 years, the Trustless Computing Association has been promoting new standards and open technologies with levels of trustworthiness that are radically beyond state-of-the-art. It has grown through unique partners and advisors into an active community of world leading experts, consultancies, the largest cyber industry associations, high-assurance open IT leaders, national state security and privacy agencies, and enterprises, around foundational R&D initiatives, a global Free and Safe in Cyberspace event series, publications and plans for public-private local ecosystems in Rome or Berlin.
Trustless Computing is the long-awaited paradigm shift. The key principle in the Trustless Computing Paradigms is to compute without the need or assumption of unverified trust in anything or anyone, except in the user-assessable technical proficiency, ethical stance and accountability of the organizational processes critically involved in the entire lifecycle of a product or a service.
Trustless Computing requires that all and every software, hardware and processes that are critically involved in the provisioning or lifecycle of a computing service – from high-level software-stack to CPU design to fabrication, to hosting room access – be subject to extreme verification relative to complexity, or to extremely resilient socio-technical oversight.
Join as pilot, channel or strategic partner other pioneering public and private partners that joined us and our non-profit arm Trustless Computing Association to promote SeeVik and its related standards.