Reshaping data ownership for the web
Securely unlocking data's full potential through a trustless ecosystem.
We go beyond providing digital trust, into provability
A Next-Gen solutionist ecosystem committed to reshaping data processing, through full encryption and code is law smart contracts. Enabling data holders to create powerful, meaningful intelligence to solve the world's most complex challenges.
Explore untapped potential
Data is one of the world's most valuable assets.
Unlock its full potential with Secretarium.
Secure your data
Protect your sensitive data with full encryption and tamper-proof databases. Overcoming business and regulatory constraints to provide endless opportunities.
Manage your data
Using our technology, networks of people and organisations can collaborate worry-free, while keeping their data safely protected.
Monetise your data
Use a privacy-first data commoditisation strategy to generate revenue streams from sensitive and commercial data without data transfer or disclosure.
Partners & adopters
Business solutions
Connect. Protect. Unlock.
COMING SOON
The Klave network
Integrity and privacy engineering made easy.
Bringing open innovation to developers through an easy-to-use network, to build and deploy trustless apps
Store
Home to trustless apps built on the platform. Discover apps that redefine data ownership for the web
Enterprise
Unlocking new business opportunities and reducing automation costs through provably secure data collaboration
Identity
Personal data storage and digital identity built into an online wallet
Cloud
Storage for encrypted documents, always keeping data owners in control
Case studies
Built with Secretarium
What makes us unique
Our technology is trustless and privacy-preserving.
Next-Gen distributed ledger technology
Secretarium's Secure-Enclave Distributed Ledger Technology is powered by a Proof-of-Processor consensus mechanism built upon Trusted Execution Environment (TEE) capabilities. This mechanism ensures instant finality and processes orders of magnitude quicker than other consensus mechanisms, while always protecting the confidentiality and integrity of data in memory.
Honest by design
Providing transparency and verifiability at all levels. Remote attestation ensures the code runs in a secure enclave on a fully updated system, with the highest level of security. Apps deployed follow the 'code is law' principle, ensuring that the app's identity, integrity, code and transactions output can be cryptographically checked.
Privacy first
Leveraging confidential computing which lies at the intersection of privacy, cryptography, security and secure hardware to protect the confidentiality and integrity of data.
Data protected in use
Using hardware-based Trusted Execution Environments (TEEs) that prevent unauthorised access or modification of apps and data while in use.
Data protected at rest
Providing tamper-proof ledgers that are fully encrypted by default and leverage on Merkle tries protection to safeguard data at rest.
Data protected in transit
Our connection protocol uses multi-layered Transport Layer Security (TLS) to guarantee a secure and inspection-resistant connection to the TEE.