Authenticity
Starts Here ™

Data Provenance for engineers to provide the security, privacy, and authenticity needed to provide safe and secure experiences—for business and personal AI.

Cryptid Technologies Logo
downward pointing arrow

Three Simple & Powerful APIs

Accelerate your migration to zero-trust architecture and scale your solution to billions of credentials without 3rd-party wallet apps.

Decentralized Privacy that Scales

Cryptid introduces a new approach to scaling security and privacy using the well-recognized principles of user sovereignty and a unified theory of decentralization. Cryptid's APIs are the only technology that delivers a simple way to verify provenance and authenticate all forms of data while preserving privacy, data integrity and ownership rights.

Immutable Data, No Blockchain Required

Our novel approach to accumulating provenance amortizes an infinite number of state proofs in one "anchor" transaction on any blockchain or database. The amortization takes blockchains out of the critical path increasing scalability while also improving energy efficiency. This also reduces costs by magnitudes if you choose to anchor on public blockchains for on-chain validation.
Global scale

Designed by Industry Veterans

Our team of industry veterans has over 100 years of combined industry experience in cryptography, digital identity, security, fraud prevention, risk and preserving privacy.

With over 3 years in R&D, we created APIs that scale decentralized digital identity / self-sovereign identity, authenticated provenance and verifiable authenticity into the billions of credentials. We designed a distributed way to protect identity without having to disclose any secrets or data. We solved for defense in depth in all areas of integration by embracing zero-trust architecture. Introducing privacy for the next generation—available to developers today.
The Linux FoundationPayPalBonifii
Sovrin
MozillaHyperledgerThe Tor Project

Cryptid API Capabilities

Cryptid API Product Capabilities

Use Cases

Secure, Verifable Software Supply Chain

close icon

The Cryptid APIs and our corroboration approach to decentralized identity and key history management makes it possible to use decentralized version control software such as Git to create an air-tight regime for contributors and contributions. Projects may demand that the first contribution from any contributor be a patch that establishes the contributor's provenance log for tracking their key history. The provenance log must also contain their digital signature over the project's code of conduct, intellectual property rights rules, and any other project participation agreements. For projects that require contributors to identify themselves, the provenance logs must also contain proof of KYC from a vendor that the project accepts along with verifiably encrypted de-anonymization data that maybe decrypted by the KYC vendor to identify the contributor if the need ever arises.

Once this regime is in place, software projects may then automate Git with complex contribution validation rules such as multiple digital signatures from maintainers before merging. The PKI problem is solved by having the key histories in the repo as authenticated provenance logs. The most basic rule set is to simply require all contributions are digitally signed by a key that is already known to the project in one of the contributor provenance logs in the repo itself. This ensures that only contributions from known contributors are accepted. It also ensures that the repo and its entire history is self-certifying and verifiable.

One other nice advantage of the decentralized and corroboration based identity approach is that all non-coding contributions may also be cryptographically linked to the project by using our Oberon API security product. Activity on community functions like message boards, CI/CD, and chat platforms may now be linked to provenance logs in the repo and therefor enable a full measure of project activity by each contributor all without the need of a centralized platform.

Anti-Deep Fake Filtering

close icon

By leveraging the decentralized identity capabilitiy described above and the authenticated provenance tracking for data, platforms that publish user generated content can now filter content based on the provenance of the data. This allows legitimate creators of content to prove the provenance on their content to get it published. Deep fakes can be filtered out simply because the creator cannot prove the content came from an authorized source.

Secure Software/Firmware Updates

close icon

Cryptid has the ability to ensure the legitimacy of any software or firmware updates using a combination of authenticated provenance and decentralized identity. The scalability of our approach makes it the ideal solution for managing software updates in large networks such as IoT sensor networks, ATM networks, fuel pump networks, smart meter networks and anywhere security and auditability is critical.

Decentralized Intellectual Property Licensing and Digital Rights Management

close icon

The corollary to the anti-deep fake filtering example above is that we now have the ability to free NFTs from blockchain walled gardens and implement a fully decentralized and automated IP licensing system with DRM that relies upon verifiable provenance and verifiable authorship and licensing terms. Using Cryptid's APIs it is possible to build self-serve IP licensing e-commerce platforms where the licensed IP can then be re-used in other platforms that enforce digital rights management by verifying the provenance.

To put it in simple terms, Cryptid's APIs open up the possiblity of licensing an avatar of a movie character from a movie studio and then use it on a gaming platform that verifies the provenance and licensing without any pre-arranged agreement between the movie studio and the gaming company.

Privacy Preserving Social Networking

close icon

Also known as "Log in as Human", the decentralized identity described above supports proving to any social networking platform that you are a human without ever telling them who you are. Oberon's private API access allows for accessing social networking platforms without sharing any private information. The scalability of our design allows for its use even on the largest of social networking platforms with billions of users.

Mutually Authenticated Communication

close icon

Along with our three APIs for authentication, authenticated provenance and verifiable authenticity, we also offer an open source implementation of the Disco protocol. Disco solves the problem of instantly resumable and mutually authenticated confidential sessions. Disco with Oberon, Theseus, and Hippolyta serves as a next generation replacement for TLS, X.509 and OAuth 2.0. Not only are the three together more flexible and resilient but they can operate over any transport medium and take the form of any kind of communication. They represent a grand convergence solution that can be used for authenticated and confidential email, authenticated and confidential instant messaging, as well as authenticated and confidential file sharing. Our Disco implementation also supports out-of-order message delivery and the sessions are resumable no matter how much time has passed since the last message was sent and received.

Start using Cryptid APIs today.