Digital Signatures

Securely bringing cryptographic keys to life lets users sign anything. Break free from the restrictions of eSignatures and the electronic representation of wet ink and open up the possibility of signing anything, anywhere.

Biometrically Gated

Every signature is secured with biometric verification, ensuring only the intended person can sign.

Legally Binding

Compliant with eIDAS, ESIGN, and other digital signature regulations worldwide.

Tamper-Evident

Cryptographic proof of document integrity and signer identity that cannot be forged.

Possibilities

True digital signatures go beyond the electronic representation of wet ink. With cryptographic keys tied to verified identities and biometric gates, you can be certain of who signed and that the document hasn't been tampered with.

Sign Anything
Beyond Documents
Sign any digital content - documents, transactions, code, or data - with the same cryptographic certainty.
Complete Audit Trail
Every signature includes a complete record of who signed, when, and with what identity verification.
Multi-Party Signing
Support for multiple signers with customizable workflows and signing orders.

Research

Secure in Name Only
Secure in Name Only
Exploring how metaphors like “vaults,” “keys,” and “wallets” shape our sense of safety—and the risks that confidence creates.
Are we getting closer to a true identity layer?
Are we getting closer to a true identity layer?
Initiatives like W3C Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) are moving us toward an identity layer
The internet was built for machines not people
The internet was built for machines not people
The internet has no built-in identity layer — it only knows devices and keys, not people. Everything we call “online identity” is an application-level patch, and that’s why the web’s trust and security problems are so persistent.‍