Secure forensics for digital proof and digital ownership
Build meaningful applications, designed to survive the future.
Common Law in the Digital World
The things that make computers and the internet powerful and useful are the same things that make it difficult for the common law to keep things nice.
The Vaulted Objects Infrastructure is a set of components that work together to provide a secure basis for common law concepts:
- Content provenance and ownership
Vaulted Objects contain encrypted digital content, and are bound to an individual’s digital identity. They provide a digital possession, as only the person in control of the Vaulted Object can access its contents. By enabling possession they enable digital files to be legally owned.
The Vaulted Objects infrastructure includes access to a state-of-the-art secure payments rail, capable of high-throughput transaction settlement in a wide range of currencies. Settlement is typically finalised within 100ms, with full legal finality, between users around the world.
Digital Seals are used to bind the identity of a person to a digital legal document, such as a deed or a contract, using cryptographic forensics. Digital Seals parallel the use of physical seals, that are sometimes used to attest to physical documents.
Self-sovereign Secure Identity Protocol
At the heart of the infrastructure is an identity protocol that is open and accessible to everyone.