argonauts
  • About
  • Domain
  • Technology
  • Services
  • Blog
  • Join us
  • Contact

Digital
interactions
made in
authentic way.

About us

We are a small team with big ambition. We want to have a real influence on the technology, hence we experiment, we invent and we create. For a better tomorrow.

Individuals establish trust by interactions in real life. We establish digital trust upon the authentic digital interaction, which are the foundation for Authentic System. We build solutions to support Authentic Systems by providing services and consultancy as well as connections to other communities.

Our story

Our philosophy

Cryptographic agility

Any software component self-evolves over time as the cryptographic algorithms evolve

Unix philisophy

Any software component does one thing and does it right

Authenticity over privacy

Perfectly established private data cannot be trusted if it is not authentic

End-verifiability

Provenance of any data can be verified by performing cryptographic verification

Domain

We specialize in building
Authentic Systems

Read more about Authentic Data

Our technology

Cryptographic primitives

Asymmetric and symmetric keys along with one way hash functions constitute the foundation for any other technology from our tool set.

Cryptographic primitives

Asymmetric and symmetric keys along with one way hash functions constitute the foundation for any other technology from our tool set.

KERI

General purpose non blockchain ambient infrastructure that preserves same characteristics, but without the need of total ordered global consistent ledger.

OCA

Defining domain boundaries within one system is not an easy task. A cross system boundaries are almost impossible to establish. OCA aims to provide such harmonization on a data level.

Provenance logs

A specialized type of Event Sourcing where any event in the log is digitally signed by the one who triggered that event. The whole chain of events is cryptographically bound.

ACDC

Authentic Chained Data Containers provide a unified platform for data in a very similar fashion that the supply chain containers are used to tnasport goods.

Our services

Development

We work with technology that just emerged and we understand the complexity behind it. We have coined or co-authored many of concepts of components around Authentic Systems, hence we have the expertise in this area.

Consultancy

We are world-leading experts in the area of Authentic Systems. We are also members of DIF and TOIP foundations and we collaborate with these communities among the concepts and technologies to serve Authentic Systems.

Jobs

We are growing fast.

See our currently
open positions.

We love to share
our knowledge
and experience

Check out blog

We always work with the best

Contact

Let's stay in contact