Cryptid Technologies
HomeBlogAbout Us
Request Access
Log In
Request Access
Menu
May 11, 2022

Authentication with Pseudonymity

How Elon can Legally Transform Twitter with Pseudonymous Free Speech
Authentication with Pseudonymity
privacy
, 
decentralization
, 
October 29, 2021

The Theory of Digital Gates

Why identity cannot be an input to vaccine passport checks or any other real-world digital authorizations.
The Theory of Digital Gates
privacy
, 
user sovereignty
, 
zero trust
, 
September 9, 2021

Zero-Trust Architecture is the Way Forward

Zero-Trust Architecture is the Way Forward
privacy
, 
authenticity
, 
August 24, 2021

Achieving Absolute Privacy

Cryptography always works, with or without privacy regulations. It is possible to preserve our privacy simply by re-thinking the flow of information on the internet. The authentic data economy allows for code to move to the data to produce cryptographic proofs based on the authentic data inputs. Sharing any of our data is now obsolete because we now know how to do business without it.
Achieving Absolute Privacy
authenticity
, 
privacy
, 
February 26, 2021

The Authentic Data Economy

The authentic data economy is a digital world built on provable provenance and verifiable authenticity of all data. It is an economy where we will all conduct business both online and in the real world while maintaining full control of our data and without forfeiting our privacy.
The Authentic Data Economy
authenticity
, 
provenance
, 
July 30, 2020

The Principles of User Sovereignty

The six principles of user sovereignty form the moral guidelines for re-engineering the internet to be humane and respectful of the people that use technology. This is the moral framework that Cryptid follows when designing new systems.
The Principles of User Sovereignty
decentralization
, 
user sovereignty
, 
July 30, 2020

A Unified Theory of Decentralization

There are nine fundamental problems of distributed systems. To be decentralized a system must have fully decentralized solutions for all nine problems. Leaving any problem unsolved, or solved with a centralized solution, leaves the system open up to corporate capture and sacrifices is independence and anti-fragility.
A Unified Theory of Decentralization
decentralization
, 
user sovereignty
, 
Cryptid Technologies
HomeBlogAbout Us
YouTube IconTwitter IconEmail icon
Copyright © 2022, Cryptid Technologies, Inc. All Rights Reserved.