Alternatives to Findora

Compare Findora alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Findora in 2024. Compare features, ratings, user reviews, pricing, and more from Findora competitors and alternatives in order to make an informed decision for your business.

  • 1
    Keeper Security

    Keeper Security

    Keeper Security

    Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
    Leader badge
    Compare vs. Findora View Software
    Visit Website
  • 2
    PlatON

    PlatON

    PlatON

    Combining blockchain and privacy-preserving computation technologies, PlatON is building a decentralized and collaborative AI network and global brain to drive the democratization of AI for safe artificial general intelligence. PlatON, initiated and driven by the LatticeX Foundation, is a next-generation Internet infrastructure protocol based on the fundamental properties of blockchain and supported by the privacy-preserving computation network. “Computing interoperability” is its core feature. By building a computing system assembled by verifiable computation, secure multi-party computation, zero-knowledge proof, homomorphic encryption and other cryptographic algorithms and blockchain technology, PlatON provides a public infrastructure in open source architecture for global artificial intelligence, distributed application developers, data providers and various organizations, communities and individuals with computing needs.
  • 3
    Dusk Network

    Dusk Network

    Dusk Network

    Dusk Network is a technology for securities. An open-source and secure blockchain (DLT) infrastructure that businesses use to tokenize financial instruments and automate costly processes. A distributed Financial Market Infrastructure (dFMI) should provide a clear and final settlement of transactions. Moreover, the settlement of transactions should be instant or near-instant (<15s). The popular proof-of-work consensus mechanism used by Bitcoin and Ethereum does not address these requirements. Therefore, we designed a more performant consensus called Succinct Attestation agreement that enables instant settlement of transactions within 15 seconds. Powered by zero-knowledge technology, organizations use the dusk networks to issue tokens that are governed by privacy-preserving smart contracts. Harnessing the power of DLT while respecting confidentiality agreements, and data protection legislation.
  • 4
    IAP Network

    IAP Network

    Information Assurance Platform

    The IAP’s innovative combination of blockchain technology, zero-knowledge proofs and meta-consensus protocols allow for any of these parties to cryptographically prove the existence of evidence, states or activities to any interested party. Moreover, they allow for complete transparency without sacrificing the privacy of sensitive data. Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data.
  • 5
    Horizen

    Horizen

    Horizen

    Horizen is powered by the most robust and secure public infrastructure enhanced with multiple security layers. Horizen’s distributed node system ensures the scalability, reliability, security and speed of its network. Horizen is also secured by an improved consensus with enhanced protection against 51% attacks. Horizen’s cross-chain protocol, Zendoo, is designed for developers to build blockchains and applications that solve today’s real-world problems with the flexibility to capture tomorrow’s opportunities. Powered by the Horizen blockchain to leverage the security of a robust PoW public blockchain with the largest distributed node network ensuring maximum reliability and resilience. Zero-knowledge enabled cross-chain protocol allowing auditable and privacy-preserving blockchains - bridging a major gap for real-world adoption.
  • 6
    Hermez

    Hermez

    Hermez

    Hermez is an open-source ZK-Rollup optimized for secure, low-cost and usable token transfers on the wings of Ethereum. Hermez seamlessly integrates into the fabric of the Ethereum ecosystem and enables low-cost token transfers for an inclusive economy. Cost-efficient token transfers and swaps with high throughput. Decentralized and open-source architecture. Computational integrity for secure transactions. By using zero-knowledge technology, transfer costs are significantly reduced, allowing more accessible financial services for mainstream adoption. Computational integrity and on-chain data availability are guaranteed by zero-knowledge-proof technology while preserving the public blockchain properties of Ethereum. Hermez's mission is to create an inclusive, resilient and highly efficient payment network for the next generation of digital currencies to ensure everyone has the freedom to transact.
  • 7
    XT.com

    XT.com

    XT.com

    The world's leading digital asset trading platform. Autonomously developed trading matching engine adopts advanced distributed cluster architecture and micro-service development, supporting transactions more than 3 million per second. Unbiased zero-knowledge proof privacy and confidentiality technology protects user privacy. Based on security designs such as multiple signatures, offline signatures, and layered architecture, it uses mature cold and hot wallet separation technologies. Build communities, directly connect customers, make traditional business management more open, and achieve a wider range of business connections. Fully compatible with iOS, Android, Mac & Windows. Now, our operation center include China, Japan, South Korea, Singapore and Hong Kong as centre. More importantly, we are trying to provide a comprehensive service for our clients including media service, group operation, group transaction, online and offline activities in Asian countries and globally.
    Starting Price: 30$
  • 8
    eperi Gateway
    You alone have full control over the encryption of your data – at any time and definitely without backdoors. All Systems – One Solution. Thanks to the patented template concept you can use the eperi® Gateway for all your (cloud-) applications and adapt it to your data protection requirements. Your employees can continue working as usual, while the eperi® Gateway encrypts data transparently and preserves the central functions of your applications (such as search and sort). Take advantage of cloud applications while staying compliant with the stringent regulations of the financial industry like privacy-preserving analytics. IoT brings forth smart machines and products that collect data independently and automatically. Thanks to encryption, you can ensure data privacy and comply with legislation.
  • 9
    Portabl

    Portabl

    Portabl

    Portabl is redefining what it means to share trusted identity information between financial service providers and the millions of people who count on them. 6 in 10 customers abandon online registration processes. That’s why we made the sign-up process as easy as sign-in. Create 2-touch financial access for any user, anywhere, across Web2 and Web3, and protect your users’ privacy and security while you’re at it. Onboard users in 2 steps and less than 15 seconds using the configurations that work best for your business. Get up and running in minutes with our APIs and SDKs for web and mobile. Validate and verify information with an added layer of security by using zero-knowledge proofs (ZKPs) in place of explicit data. Use globally-recognized standards (OIDC SIOP) to let your users log in with their verified identity over an encrypted channel, eliminating the password risk. Access changes in your customer data as they happen, supported by a tamper-resistant audit ledger.
  • 10
    Aleph Zero

    Aleph Zero

    Aleph Zero

    Privacy-enhancing public blockchain with instant finality. Aleph Zero is built for enterprise, Web 3.0, and DeFi use-cases. Aleph Zero is a proof-of-stake public blockchain. We combined an original, aBFT consensus protocol with a customized substrate stack. Currently, we’re working on enhancing the platform with a privacy framework based on Zero-knowledge Proofs (ZKPs) and secure Multi-Party Computation (sMPC) to empower developers with a unique approach to private smart contracts. During a laboratory test, Aleph Zero’s peer-reviewed consensus protocol (AlephBFT) achieved 89,600 tx/s with a 416 ms confirmation time in a decentralized test setting of 112 AWS nodes spread across five continents. Aleph Zero’s real-world performance, especially under heavy l network load, is yet to be determined. The Aleph Zero Consensus Protocol has been officially peer-reviewed and accepted for publication in the conference proceedings of advances in financial technology 2019.
  • 11
    Finema

    Finema

    Finema

    We provide a holistic solution to all your credential ownership and management. Not only applicable to a wide range of scenarios, it is secure, convenient and fully owned by you. You can check whether the information presented is a real human, real transcript, authentic brand-name bag, or malevolent fraudster from barely revealing any data, thanks to our cryptographic technique. Our platform provides secure, privacy-preserving and cost-effective — the way to help people manage their identity on the internet.
  • 12
    Sahara AI

    Sahara AI

    Sahara AI

    Build Sahara knowledge agents as custom on-premise AI solutions that save costs, drive growth, and enable new business opportunities. Elevate productivity through workflow automation, predictive analytics, personalized experiences, resource optimization, and supply chain enhancement. Participate in Sahara data, a trustless, permissionless, and privacy-preserving platform for high-value datasets and data services to train AI. The business extends far beyond conversational capabilities, autonomously analyzing both external and internal proprietary data to offer reliable decision-making tailored to specific needs. The platform, decentralized or on-premise, offers an intelligent AI-centered, human-in-the-loop, and privacy-preserving approach to deliver high-value data for your AI.
  • 13
    BeeKeeperAI

    BeeKeeperAI

    BeeKeeperAI

    BeeKeeperAI™ uses privacy-preserving analytics on multi-institutional sources of protected data in a confidential computing environment including end-to-end encryption, secure computing enclaves, and Intel’s latest SGX enabled processors to comprehensively protect the data and the algorithm IP. The data never leaves the organization’s protected cloud storage, eliminating the loss of control and “resharing” risk. Uses primary data - from the original source - rather than synthetic or de-identified data. The data is always encrypted. Healthcare-specific powerful BeeKeeperAI™ tools and workflows support data set creation, labeling, segmentation, and annotation activities. The BeeKeeperAI™ secure enclaves eliminate the risk of data exfiltration and interrogation of the algorithm IP from insiders and third parties. BeeKeeperAI™ acts as the middleman & matchmaker between data stewards and algorithm developers, reducing time, effort, and costs of data projects by over 50%.
  • 14
    DERO

    DERO

    DERO

    DERO is a general-purpose, private, and scalable decentralized application platform that allows developers to deploy powerful and unstoppable applications, while users retain total control over their assets with complete privacy. Account balances and data are never decrypted by the blockchain. Only account owners can decrypt and access their data. Welcome to a new data privacy paradigm. DERO has been developed from scratch in Golang and is being actively developed by the original developers. It is not a fork of any other coin. DERO is a homomorphically encrypted protocol that can serve individuals and businesses worldwide, with fast and anonymous transactions, smart contracts, and service models. The DERO Project has created a platform for developers to deploy secure, open, scalable, and privacy-preserving decentralized applications. DERO is unique because we value security and privacy above all else.
  • 15
    AppsFlyer

    AppsFlyer

    AppsFlyer

    AppsFlyer helps brands make good choices for their business and their customers through innovative, privacy-preserving measurement, analytics, fraud protection, and engagement technologies. Built on the idea that brands can increase customer privacy while providing exceptional experiences, AppsFlyer empowers thousands of creators and 10,000+ technology partners to create better, more meaningful customer relationships.
  • 16
    Xtendr

    Xtendr

    Xtendr

    XtendR unhides detailed, privacy-preserving insights across multiple independent data sources. XtendR enables access to thus far inaccessible data, and protects you during your entire data lifecycle, giving you confidence in complete privacy and regulatory compliance. XtendR is more than anonymity, it’s the critical missing piece for multi-party data sharing with true privacy protection - it is cryptography on duty so you can reach your full potential. The most advanced privacy-enhancing data collaboration technology. Xtendr solved the decades-long cryptography challenge of data sharing between mutually mistrustful parties. Take your business further with an enterprise-grade data protection offering that allows individual organizations to form data partnerships while protecting sensitive data. Data is the currency of our digital age. Some argue that it is replacing oil as the world's most valuable resource and there is no doubt about its growing importance.
  • 17
    Liink

    Liink

    JPMorgan Chase

    Unleash the power of the world’s first bank-led, peer-to-peer network for secure, privacy-preserving information exchange. Liink has the potential to enable participants to build applications1 that leverage shared information, making it possible to solve common industry challenges. Network participants exchange data privately while maintaining control over who they connect with, how the data is shared, and who can use it. Organizations can leverage Liink to establish new business models and unlock new commercial opportunities.
  • 18
    Granica

    Granica

    Granica

    The Granica AI efficiency platform reduces the cost to store and access data while preserving its privacy to unlock it for training. Granica is developer-first, petabyte-scale, and AWS/GCP-native. Granica makes AI pipelines more efficient, privacy-preserving, and more performant. Efficiency is a new layer in the AI stack. Byte-granular data reduction uses novel compression algorithms, cutting costs to store and transfer objects in Amazon S3 and Google Cloud Storage by up to 80% and API costs by up to 90%. Estimate in 30 mins in your cloud environment, on a read-only sample of your S3/GCS data. No need for budget allocation or total cost of ownership analysis. Granica deploys into your environment and VPC, respecting all of your security policies. Granica supports a wide range of data types for AI/ML/analytics, with lossy and fully lossless compression variants. Detect and protect sensitive data even before it is persisted into your cloud object store.
  • 19
    Veres One

    Veres One

    Veres One

    Veres One is a secure, privacy-preserving, and cost-effective way for you to control and manage your identity on the web. Ledgers enable us to reduce identifier management costs through shared common infrastructure. Veres One is optimized for identity, which further reduces costs. As a result, network operating costs and fees are a fraction of those of general-purpose ledgers like Bitcoin and Ethereum. Unlike many other networks, Veres One does not use a scarce network token. This removes price volatility and regulatory risks associated with speculative token networks. Veres One charges low, stable fees that decrease as the network scales. Distributed systems enable competitors to cooperate on common infrastructure. These systems naturally resist centralization, surveillance, and censorship, which are threats to identity. Veres One utilizes decentralized technology and governance to protect your identifiers.
  • 20
    Cwtch

    Cwtch

    Open Privacy Research Society

    Cwtch (/kʊtʃ/ - a Welsh word roughly translating to “a hug that creates a safe place”) is a decentralized, privacy-preserving, multi-party messaging protocol that can be used to build metadata resistant applications. Decentralized and Open Participants in Cwtch can host their own safe spaces, or lend their infrastructure to others seeking a safe space. There is no “Cwtch service” or “Cwtch network”. The Cwtch protocol is open, and anyone is free to build bots, services and user interfaces and integrate and interact with Cwtch. All communication in Cwtch is end-to-end encrypted and takes place over Tor v3 onion services. Cwtch has been designed such that no information is exchanged or available to anyone without their explicit consent, including on-the-wire messages and protocol metadata.
    Starting Price: Free
  • 21
    Litentry

    Litentry

    Litentry

    The Litentry IdentityHub allows you to aggregate your personal data from blockchains and platforms to manage granular access to DApps. Our incorruptible hardware infrastructure allows you to stay anonymous when you need to and reveal yourself when you don't. Take back what is yours with tamper-proof digital data containers that only you own. Respect the privacy of your perfect user and learn how to effectively reach your target audience without violating their trust. Litentry's protocol and front-end products are used for any type of identity data generation, computation, and transfer where security and privacy are important. Our products allow you to manage your digital identity data scattered across Web2 and Web3 platforms, and generate and manage a verifiable identity with the help of privacy-preserving computation.
  • 22
    Notebook

    Notebook

    Notebook

    Zero-knowledge cryptography for anonymous KYC and soul-bound credentials. We believe that the future of trust is blockchain. Notebook helps you secure your identity and your data, so you can authenticate yourself in a trustless world. Notebook leverages fragmented identity and Zero-Knowledge Proofs to keep users anonymous. A Notebook is stored on-chain in a smart contract, meaning no individual or corporation owns your identity or data but you. A Notebook is the best way to store summary statistics, such as metrics for credit score and bad-actor behavior. Storing such metrics makes for a more fair world, where people are held accountable for all their actions and believe in the greater good. The PII data required when a user onboards prevents an individual from creating multiple Notebooks, without compromising on their privacy. Notebook's identification system is dissociated from the user's wallet addresses, allowing the same identity to be used cross-chain.
  • 23
    Loopring

    Loopring

    Loopring

    Loopring is an open protocol for building scalable non-custodial exchanges on Ethereum. Leveraging zero-knowledge proofs (zkRollup), it allows for high performance trading (high throughput, low settlement cost), without sacrificing Ethereum-level security guarantees. Users always maintain 100% control of their assets throughout the trade lifecycle. You can trade on Loopring to test it out. Loopring is an open-sourced, audited, and non-custodial exchange protocol, which means nobody in the Loopring ecosystem needs to trust others. Cryptoassets are always under users' own control, with 100% Ethereum-level security guarantees. Loopring powers highly scalable decentralized exchanges by batch-processing thousands of requests off-chain, with verifiably correct execution via ZKPs. The performance of underlying blockchains is no longer the bottleneck. Loopring performs most operations, including order-matching and trade settlement, off the Ethereum blockchain.
  • 24
    Sindri

    Sindri

    Sindri

    Sindri accelerates zero-knowledge proving to build tomorrow's apps today. Request a demo today and begin your journey with custom-proving API credentials. Import circuits in any format with Sindri's versatile platform, designed for maximum flexibility. Rapid ZK proof generation to quickly turn ideas into realities with an average of 50% faster end-to-end proof times. Sindri’s forward-compatible and cost-efficient solutions scale from 1 to n requests seamlessly. Sindri simplifies building, deploying, and scaling zero-knowledge apps. Bypass managing complex infrastructure. Instead, focus on shipping amazing projects that leverage the magic of zero-knowledge proofs. With Sindri, you get an innovation partner offering cost-effective scaling and high-performance solutions tailored to your needs. Sindri offers a framework-agnostic platform that evolves with your project's needs to future-proof your solutions.
  • 25
    Optable

    Optable

    Optable

    End-to-end data clean room platform, integrated for activation. Publishers and advertisers use Optable data clean room technology to securely plan, activate and measure advertising campaigns. A new generation of privacy-preserving data collaboration software. Optable customers can collaborate with their customers and partners, including those who aren't Optable customers themselves. This can be done using the platform's Flash Nodes, allowing to invite other parties into a secure environment. Optable offers a decentralized identity infrastructure, allowing to build of private identity graphs. The infrastructure provides means for creating purpose-limited, permission data clean rooms that minimize data movement. Interoperability with data warehouses and other data clean rooms is key. The use of our open-source software allows third-party platforms to match data with Optable customers, as well as implement secure clean room functions for their own use.
  • 26
    Concordium

    Concordium

    Concordium

    A blockchain that’s compliance ready with today’s and tomorrow’s economies. That enables private and public transactions. That offers high throughput, fast transactions, and predictable fees. That allows businesses, developers, and traders to harness blockchain’s true power and potential. Concordium’s decentralised blockchain technology is the first with layer-one ID built into the protocol. This means it offers forward-thinking businesses, application developers, and cryptocurrency traders unrivalled security, privacy, transparency and most importantly, compliance with regulations, if and when these come through. Utilizing zero-knowledge-proofs (ZKP) allows parties to verify information without exchanging or storing that information on-chain other than hash functions, so users can trust that their confidential business will become no one else’s business.
    Starting Price: Free
  • 27
    Oasis Parcel

    Oasis Parcel

    Oasis Labs

    Build a more trusted product with the latest in data security and governance technology. The privacy-first data governance SDK designed to put your most sensitive data to use while keeping it secure and private. The Parcel SDK comes with a built-in dispatcher, which makes it easy to spin up an isolated environment for privacy preserving computation. With access to cutting edge secure-enclave technology, data can remain confidential and protected at every stage of the lifecycle. From web apps to infrastructure stacks, the Parcel SDK can be integrated with a broad range of services and technologies. With support for Typescript, the Parcel SDK can easily be added into your development flow, no custom languages or complex systems to learn. Powered by a decentralized ledger, Parcel provides an immutable record of all actions taken, so you can ensure your data is being used in a compliant and responsible way.
  • 28
    Footprint

    Footprint

    Footprint

    Onboard users with the click of a button. Offload handling sensitive data. Grow your user base quickly and securely with Footprint's one-click KYC and secure data vault. Footprint’s privacy-preserving technology lets you satisfy KYC without needing to ever touch PII. Our secure patent-pending PII vault protects your user's data while saving you time and money. Footprint leverages cutting-edge biometric scans, patent-pending liveness checks, and peer-to-peer verification to validate real people in real time. Our ecosystem keeps bad actors out while creating a seamless experience for real users. Footprint’s technology combines storage and verification. Our solution is up to 2x cheaper than traditional methods to verify and store PII because we are able to condense what today requires multiple tools into one.
    Starting Price: 30¢per user per year
  • 29
    LiveRamp

    LiveRamp

    LiveRamp

    Everything we do centers on making data safe and easy for businesses to use. Our Safe Haven platform powers customer intelligence, engages customers at scale, and creates breakthrough opportunities for business growth. Our platform offers the modern enterprise full control of how data can be accessed and used with industry leading software solutions for identity, activation, and data collaboration. Build access to data, develop valuable business insights and drive revenue while maintaining full control over access and use of data at all times. Accurately address your specific audiences at scale across any channel, platform, publisher or network and safely translate data between identity spaces to improve results. Protect your customer data with leading privacy-preserving technologies and advanced techniques to minimize data movement while still enabling insight generation.
  • 30
    Polyhedra

    Polyhedra

    Polyhedra

    Bringing interoperability and scalability with cutting-edge zero-knowledge proof systems. zkBridge uses zkSNARKs to enable a prover to efficiently convince the receiver chain that a certain state transition happened on the sender chain. zkBridge consists of a block header relay network and an updater contract. The block header relay network retrieves the block headers from the sender chain, generates proofs of the validity of the block headers, and sends the headers along with the proofs to the updater contract (set up on the receiver chain). The updater contract maintains a light-client state. It automatically adds block headers of the sender chain once the associated proofs are verified, and updates the current main chain of the sender chain. Polyhedra Network implements infrastructures for interoperability across heterogeneous systems which guarantee strong security without extra trust assumptions.
  • 31
    SponsorBlock

    SponsorBlock

    SponsorBlock

    Users submit when a sponsor happens from the extension, and the extension automatically skips sponsors it knows about using a privacy-preserving query system. It also supports skipping other categories, such as intros, outros and reminders to subscribe, and skipping to the point with highlight. To prevent one submission with a lot of votes never being able to be replaced, I decided to use a weighted random distribution based on the equation on the right. This formula makes the first few votes matter a lot more than votes on a submission that already has a lot of votes. This gives newly submitted segments a better chance of being sent out to users to get votes. So, most users will get the best submission, but some users will get lesser votes submissions so that they can either be upvoted or downvoted.
    Starting Price: Free
  • 32
    Zcash

    Zcash

    Zcash

    Spend it, save it or send it to a friend. Unlike many other forms of payment, Zcash shielded transactions keep all your financial information private and in your control. In addition to using Zcash to pay friends, family and service providers, you can use Zcash at your favorite stores or online merchants. Zcash was the first project to implement zk-SNARKs, a novel form of zero-knowledge cryptography that gives its users the strongest privacy available in any digital currency. Zcash can be purchased on any number of exchanges. Gemini is easy to use and it offers privacy options that others don't. But if Gemini isn't available in your country, there are many other reputable exchanges.
  • 33
    trinsic

    trinsic

    trinsic

    trinsic connect is a reusable identity verification solution powered by verifiable credentials, digital wallets, and passkeys. Applications can now instantly verify and onboard new users through Trinsic’s reusable identity network. Simplify the user experience with password-less authentication for maximum security with minimum friction. Using zero-knowledge proofs, users can prove things about themselves without oversharing their data. Unlock interoperability for your product without any additional effort on your end. Pre-verified users speed through onboarding helping you acquire more customers at a lower cost.
  • 34
    Kadena

    Kadena

    Kadena

    Kadena’s public blockchain is a braided, high-throughput Proof of Work system that improves throughput and scalability while maintaining the security and integrity found in Bitcoin. Kadena uses its native token, KDA, to provide a secure and scalable means of providing virtual currency. Furthermore, Kadena serves as a way of sharing data and is implemented across various industries: finance, health care, insurance, and more. ​Kadena’s main net is now fully accessible for public mining. You can find the latest release on our Chainweb-node GitHub Project and watch the mining of the parallel chains in real-time through Kadena’s Block Explorer. We also released our Testnet Portal, a one-stop shop where you can download our testnet wallet, get testnet coins, play a game, and have fun interacting with our blockchain! Kadena’s public blockchain is a massively parallel protocol that brings efficiency to Proof of Work.
  • 35
    Bitfount

    Bitfount

    Bitfount

    Bitfount is a platform for distributed data science. We power deep data collaborations without data sharing. Distributed data science sends algorithms to data, instead of the other way around. Set up a federated privacy-preserving analytics and machine learning network in minutes, and let your team focus on insights and innovation instead of bureaucracy. Your data team has the skills to solve your biggest challenges and innovate, but they are held back by barriers to data access. Is complex data pipeline infrastructure messing with your plans? Are compliance processes taking too long? Bitfount has a better way to unleash your data experts. Connect siloed and multi-cloud datasets while preserving privacy and respecting commercial sensitivity. No expensive, time-consuming data lift-and-shift. Usage-based access controls to ensure teams only perform the analysis you want, on the data you want. Transfer management of access controls to the teams who control the data.
  • 36
    Topos Protocol
    Topos, the first zero-knowledge blockchain ecosystem, will allow you to deploy sovereign execution layers and DApps with native interoperability and cryptographic security. Explore protocol, guides, and references to get up and running on the Topos platform. Topos has something to offer for you. Web3 developers, whether from the Ethereum domain or other popular ecosystems, frequently grapple with inherent platform challenges. Topos is a technology created to alleviate these concerns and more. It is the first ecosystem that offers uniform security across its shards (called subnets), with provable state transition validity and state non-equivocation. Spawn your own subnets, and launch or scale your DApp on them. Implement new types of cross-subnet messages relevant to your DApp. Natively and securely interoperate and compose value with other subnets. Enjoy uniform security across your subnets and all other subnets in the ecosystem.
  • 37
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01
  • 38
    Resiliant

    Resiliant

    Resiliant

    Affordable, secure, user centric password-less ID authentication using blockchain and AI technology. Control your digital risk and protect data while locking out undesired users and devices. One-time onboarding for multiple uses across the web, servers, networks and devices. No more passwords, 2FA codes, or matching images, which do not protect the user and enterprise against SIM swapping or false geolocation. Decentralized IdNFT™ gives the user ownership and control of their identity. Secured by blockchain, no private data is stored or uploaded to the cloud. Zero-knowledge proof permits transfer of information without revealing user credentials.
  • 39
    Build on Bitcoin (BOB)

    Build on Bitcoin (BOB)

    Build on Bitcoin (BOB)

    BOB (“Build on Bitcoin”) is the first EVM rollup stack with native Bitcoin support. Build decentralized apps on top of Ordinals, Lightning, Nostr. Make your EVM smart contract available to 300 million Bitcoin users. Unlock unparalleled liquidity for BTC and stablecoins. BOB is your swiss-army-knife for all things building on Bitcoin: unified wallet experience, trustless bridges, zero-knowledge proofs, cross-chain cryptography, and much more. Bitcoin DeFi, decentralized Ordinals markets, stablecoin payments, gaming or SocialFi - whatever you're building on Bitcoin, BOB has got you covered.
  • 40
    Aleo

    Aleo

    Aleo

    Modular and compliant. The ultimate toolkit for building private applications is finally here. World-class infrastructure built for you and your team. From IDE to blockchain and everything in between. Develop with Leo. Write your app using our programming language, with ease. Iterate blazingly fast. Use our platform to compile and test, frustration-free. Deploy to the blockchain. Launch your shiny new app in less time than ever. Discover what we're building for developers like you. Write applications in a breeze with packages from our community on Aleo Package Manager. For the first time, make no compromise between convenience and user privacy. Deploy and share your application on Aleo easily for life. Aleo has put together a solid compiler team to build a very ambitious circuit compiler language. The core aim of this endeavor is to allow developers to make use of zero-knowledge proofs in their applications in as simple a manner as possible.
  • 41
    Sphere Identity

    Sphere Identity

    Sphere Identity

    With online forms out of the way, the customer onboarding process is smoothed-out and streamlined. Personal information can be shared and validated seamlessly. Update your subscription as regulations or business requirements change – options range from ‘Zero-knowledge proofs’ to fully-verified documents for KYC compliance. Volume-based pricing lets you pay for the exact data type and quantity your business needs and you can change it as required. Privacy concepts are applied throughout development, during each product’s lifecycle. We take a systematic approach that relies on accepted standards and process frameworks, and are open for external review. Sphere Identity has data protection policies, guidelines and work instructions in place. Every new system, process and policy is adopted by the entire organisation and is monitored throughout its lifetime.
    Starting Price: $1.20 per transaction
  • 42
    Ocean Protocol

    Ocean Protocol

    Ocean Protocol Foundation

    Ocean Protocol unlocks the value of data. Data owners and consumers use Ocean Market app to publish, discover, and consume data in a secure, privacy-preserving fashion. Holders stake liquidity to data pools. Developers use Ocean libraries to build their own data wallets, data marketplaces, and more. Ocean data tokens wrap data services as industry-standard ERC20 tokens. This enables data wallets, data exchanges, and data co-ops by leveraging crypto wallets, exchanges, and other decentralized finance (DeFi) tools. Ocean makes it easy to publish data services (deploy and mint ERC20 data tokens), and to consume data services (spend data tokens). Crypto wallets, exchanges, and DAOs become data wallets, exchanges, and DAOs. Data tokens are the interface to connect data assets with blockchain and DeFi tools. Crypto wallets become data wallets, crypto exchanges become data marketplaces, DAOs for data co-ops, and more via DeFi composability.
  • 43
    Internxt

    Internxt

    Internxt

    Internxt is a secure cloud storage company committed to redefining how individuals and businesses manage their data. With a strong focus on security, privacy, and innovation, Internxt offers a range of innovative and safe storage solutions designed to empower users with flexible and user-friendly data management tools. Our open-source, end-to-end encrypted, zero-knowledge cloud storage services and a commitment to user privacy make Internxt a trusted partner for safeguarding digital assets. We pride ourselves on delivering top-quality products and services, prioritizing data security and accessibility. With a global presence and a dedication to excellence, Internxt is at the forefront of the digital data revolution, providing reliable and innovative solutions for the modern age. Internxt offers 3 main services, including Internxt Drive, Photos, and Send, with up to 10GB of free storage space for each. You can get more storage with our affordable monthly, annual, and lifetime plans.
    Starting Price: €0.99 per month
  • 44
    PassHub

    PassHub

    WWPASS

    Not only are passwords encrypted while stored in PassHub, but they are also only ever decrypted on the user’s device. Client-side encryption means that PassHub never knows your cryptographic key, making it a true zero-knowledge system. Compromised credentials are the cause of over 81% of data breaches. Take control of your business by storing and sharing passwords securely within your team. Use client-side encryption to prevent third -party companies from gaining access to your business credentials and the information you protect. Streamline employee turnover to make onboarding faster, and prevent reassigned employees from having unnecessary access when they leave a role. Help employees create random, high-strength passwords for all business websites and applications, and store and share them securely.
  • 45
    Secret Network

    Secret Network

    Secret Network

    Secret Network is the first blockchain with data privacy by default, allowing you to build and use applications that are both permissionless and privacy-preserving. This unique functionality protects users, secures applications, and unlocks hundreds of never-before-possible use cases for Web3. Whether you’re a developer, an artist, an entrepreneur, or a dreamer, you can become a Secret Agent and contribute to Secret Network. Check out the many contributors, collaborators, applications, and backers that make up the Secret Network ecosystem. With blockchain technology, we have the potential to create a more empowering and inclusive internet, what is often referred to as Web3. But current blockchains are public by default, exposing all data to everyone and putting users at risk. In order to enable meaningful use cases and achieve global adoption, users and organizations need control over how their data is used and shared, a concept we call programmable privacy.
  • 46
    akaChain

    akaChain

    akaChain

    The blockchain-backed enterprise platform for Digital ID. akaChain, the blockchain-backed enterprise platform, offers scalable, secure, and transparent Digital ID to enterprise that wish to overcome the hurdle of proof of identity. akaChain, is an end-to-end, permissioned, multi-chain network based on the Hyperledger Fabric. The Privacy Preserved Bridge Protocol cryptographically stores private data to ensure transparency and security with a focus on empowering business innovations and creating a fair and objective network environment. Low redemption, balance sheet liability, and human errors are the past. Transform your loyalty with blockchain. Don’t let your customers be credit invisible. Explore how blockchain powers credit scoring. The modern supply chain is broken. Put your customers’ mind at ease with the transparency. Business across industries has transformed with akaChain.
  • 47
    WhyLabs

    WhyLabs

    WhyLabs

    Enable observability to detect data and ML issues faster, deliver continuous improvements, and avoid costly incidents. Start with reliable data. Continuously monitor any data-in-motion for data quality issues. Pinpoint data and model drift. Identify training-serving skew and proactively retrain. Detect model accuracy degradation by continuously monitoring key performance metrics. Identify risky behavior in generative AI applications and prevent data leakage. Protect your generative AI applications are safe from malicious actions. Improve AI applications through user feedback, monitoring, and cross-team collaboration. Integrate in minutes with purpose-built agents that analyze raw data without moving or duplicating it, ensuring privacy and security. Onboard the WhyLabs SaaS Platform for any use cases using the proprietary privacy-preserving integration. Security approved for healthcare and banks.
  • 48
    Hyperledger Indy

    Hyperledger Indy

    Hyperledger

    Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or can be used standalone powering the decentralization of identity. Distributed ledger purpose-built for decentralized identity, correlation-resistant by design. DIDs (Decentralized Identifiers) that are globally unique and resolvable (via a ledger) without requiring any centralized resolution authority. Pairwise Identifiers create secure, 1:1 relationships between any two entities. Verifiable claims are interoperable format for exchange of digital identity attributes and relationships currently in the standardization pipeline at the W3C. Zero Knowledge Proofs which prove that some or all of the data in a set of Claims is true without revealing any additional information.
  • 49
    gpg4o

    gpg4o

    Giegerich & Partner

    Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft® Outlook® 2010/2013/2016 safely once and for all with gpg4o®, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o® is suitable both for private and enterprise use. gpg4o® by Giegerich & Partner guarantees the privacy of your electronic correspondence by mail encryption. gpg4o® enables the integration of one of the most widely used and safest email encryption systems into Microsoft® Outlook® 2010, Microsoft® Outlook® 2013, Microfost Outlook 2016 and for Microsoft® Outlook® 2019. Easy installation and an intuitive user experience help you preserve the privacy of your email. With the gpg4o® product maintenance, you will always get the latest features for more security and even better user experience.
    Starting Price: $93 one-time payment
  • 50
    Succinct

    Succinct

    Succinct

    Making zero-knowledge proofs accessible to any developer. Write ZKPs with Rust using SP1, a performant, open-source zkVM and generate proofs in 1-click on Succinct’s decentralized prover network. With SP1, developers can write Rust, reusing existing libraries for reduced development time and better maintainability. Instead of requiring specialized expertise writing circuits for months, write your verifiable program in hours. SP1’s state-of-the-art performance is a result of its next-generation “precompile-centric” architecture. SP1 shows general-purpose Rust code can match the performance of specialized circuit-based approaches.