|
The Mesh is the new Web |
|
|
Secured by the Universal Name System™ and the Universal Certificate Authority™ |
|
|
The Mesh is the new Web |
|
|
Secured by the Universal Name System™ and the Universal Certificate Authority™ |
|
Global & Unified IdentityA single namespace for everyone and everything. |
Global & Verified TrustThe Web can't be globally verified. The Mesh is. |
Built-in Data AuthenticityProvenance and integrity are globally assured. |
Confidentiality & PrivacyPersonal spaces, not personalized web pages. |
End Identity Theft
Identity theft is a consequence of the disjointed, domain-centric architecture of the Web. Without a global unified namespace, the Web requires each domain to manage identity independently. This “every domain for itself” model makes global identity security impossible. In contrast, the cryptographic namespace of the Mesh enables the creation of individual keychains for each person and non-person entity. Domains can then lock their users’ account with unique keys on their users’ personal keychains.
|
|
End Data Breaches
Data breaches are symptoms of the domain-centric data security model of the Web. Without built-in cryptographic security at the individual person or non-person entity level, the Web requires each domain to secure data on its own. This approach increases the global attack surface and puts “domain insiders in the middle”, creating vulnerabilities and liability along with it. In contrast, the Mesh automates personal encryption of all data across all domains, with no privileged administrator at all.
|
|
Eliminate Fakes
Digital authenticity is the global assurance of data provenance and integrity. Resolving a digital original from its copies requires global and seamless cryptographic chains of data custody. The domain-centric architecture of the Web makes this fundamentally impossible. In contrast, the Mesh equips every person and non-person entity with a single, globally unique keychain to cryptographically secure global chains of trust, chains of custody, and chains of events.
|
|
Eliminate Fraud
Personal cryptography is critical to eliminating global fraud. Equipped with their own personal keys, every person and non-person entity can sign, verify, encrypt, decrypt and transact with complete end-to-end trust and security. But cryptography is unforgiving, and humans are unreliable. Lose your keys and you lose everything. The Mesh makes personal cryptography usable and reliable for everyone and everything by automating, attesting and verifying decentralized key management at global scale.
|
Generated, not Administered
The Web’s reliance on privileged administration is a built-in vulnerability. In contrast, the information space of the Mesh is cryptographically generated with no human insider at all. |
Mathematical Certainty
Web links can be tampered with. In contrast, the Mesh mathematically unites each entity identifier with its own keys and encrypted data to enable global assurance of data provenance and integrity. |
Trustworthy Computing
Nothing can be verified on the Web. The Mesh automates the global verification of all hardware and software actors to enables all organizations to deploy their own on a globally trusted and unified network. |
Automated Chains of Trust
Privileged insiders preclude global zero trust. The Mesh enforces the verification of all hardware and software actors to automate the creation of cryptographic chains of trust. |
Chains of Data Custody
Unlike the Web, the Mesh enforces cryptographic chains of data custody. All data objects are encrypted with unique keys exclusively managed by verified actors. |
Attested Cryptography
Cryptography is unforgiving, and humans are unreliable. The Mesh automates verified personal cryptography, making it reliable and usable by everyone for everything. |