Honest Computing
Achieving demonstrable data protection and process integrity for data and process-critical systems.
Technology Stack
Confidential Computing
Hardware-based Trusted Execution Environments (TEEs) power Turing complete-capable secure enclaves in which applications can execute securely and protect their data from unauthorised access. Applications have a unique measurement that can be remotely attested to detect tampering attempts. We use secure hardware for integrity, memory encryption and remote attestation.
Data Privacy & Security
On top of keeping data always encrypted in memory, we enable the use of advanced privacy techniques such as Differential Privacy and Privacy Budgeting for the analysis of datasets which protects the privacy of discreet data points. We enforce data provenance, which refers to the origination and authenticity of the data, as well as data lineage to capture the full picture of data transformations. This is done in a transparent fashion while building a tree of dependencies, ultimately providing a continuous view of the data, its ownership, and what intelligence and insights can be securely derived.
Integrity & Verifiable Transparency
When software operates in opaque or proprietary ways, accountability and trust become challenging. Secretarium technology enables accountability through verifiable transparency by allowing stakeholders to independently verify the claims and functioning of the system. The Verifiability aspect allows for checking the correctness and reliability of computing processes and outcomes. The integrity or tamper proofness aspect applies to both the data and business logic, when enforcing their immutability, lineage and traceability over time.
Interoperability & Scalability
Secretarium is designed to connect to other digital services the same way internet services connect to one another. Services can seamlessly integrate with existing web systems, blockchain networks, and other Secretarium services. This facilitates the creation of bridges and trustable services to connect private data to secure processing, and break siloes.
Certifications & Registrations
Articles & Publications
We actively engage in highly innovative projects. Explore our latest publications featuring our cutting-edge technology.