Alternatives to Sindri

Compare Sindri alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Sindri in 2026. Compare features, ratings, user reviews, pricing, and more from Sindri competitors and alternatives in order to make an informed decision for your business.

  • 1
    Passwork

    Passwork

    Passwork

    Passwork is an on-premise corporate password manager built for security-conscious organizations. Developed and headquartered in Europe (Barcelona, Spain), Passwork meets GDPR, NIS2, ENS and other European regulatory requirements by design. All passwords and credentials are stored exclusively on your own server. Double-layer AES-256 encryption (server-side and client-side) with zero-knowledge architecture means your data stays within your infrastructure, fully under the control of your system administrators. Passwork is ISO/IEC 27001 certified. Your data never leaves your infrastructure. Trusted by enterprises for secure password sharing, privileged access management, & centralized credential governance.
    Leader badge
    Partner badge
    Compare vs. Sindri View Software
    Visit Website
  • 2
    Keeper Security

    Keeper Security

    Keeper Security

    Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
    Leader badge
    Compare vs. Sindri View Software
    Visit Website
  • 3
    Findora

    Findora

    Findora

    Deploy financial infrastructures with privacy-preserving transparency. Findora enables assets of any nature - dollar, bitcoin, equity, debt and derivatives. Its mission is to address the challenges necessary to support this broad class of assets and diverse financial use cases, providing confidentiality while retaining the transparency of other blockchains. Findora uses zero-knowledge proofs and secure multi-party computation to support many privacy-preserving features. Specialized zero-knowledge proofs allow Findora to be publicly audited, while data remains confidential. Findora features a high-throughput ledger design, and reduces storage requirements through cryptographic accumulators. Findora breaks open data silos for easy interoperability between the main- and side-ledgers. Findora provides you with the tools, documentation, and support to help you build your applications. Develop privacy-preserving applications on the Findora testnet today.
  • 4
    Succinct

    Succinct

    Succinct

    Making zero-knowledge proofs accessible to any developer. Write ZKPs with Rust using SP1, a performant, open-source zkVM and generate proofs in 1-click on Succinct’s decentralized prover network. With SP1, developers can write Rust, reusing existing libraries for reduced development time and better maintainability. Instead of requiring specialized expertise writing circuits for months, write your verifiable program in hours. SP1’s state-of-the-art performance is a result of its next-generation “precompile-centric” architecture. SP1 shows general-purpose Rust code can match the performance of specialized circuit-based approaches.
  • 5
    IAP Network

    IAP Network

    Information Assurance Platform

    The IAP’s innovative combination of blockchain technology, zero-knowledge proofs and meta-consensus protocols allow for any of these parties to cryptographically prove the existence of evidence, states or activities to any interested party. Moreover, they allow for complete transparency without sacrificing the privacy of sensitive data. Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data.
  • 6
    Notebook

    Notebook

    Notebook

    Zero-knowledge cryptography for anonymous KYC and soul-bound credentials. We believe that the future of trust is blockchain. Notebook helps you secure your identity and your data, so you can authenticate yourself in a trustless world. Notebook leverages fragmented identity and Zero-Knowledge Proofs to keep users anonymous. A Notebook is stored on-chain in a smart contract, meaning no individual or corporation owns your identity or data but you. A Notebook is the best way to store summary statistics, such as metrics for credit score and bad-actor behavior. Storing such metrics makes for a more fair world, where people are held accountable for all their actions and believe in the greater good. The PII data required when a user onboards prevents an individual from creating multiple Notebooks, without compromising on their privacy. Notebook's identification system is dissociated from the user's wallet addresses, allowing the same identity to be used cross-chain.
  • 7
    Hermez

    Hermez

    Hermez

    Hermez is an open-source ZK-Rollup optimized for secure, low-cost and usable token transfers on the wings of Ethereum. Hermez seamlessly integrates into the fabric of the Ethereum ecosystem and enables low-cost token transfers for an inclusive economy. Cost-efficient token transfers and swaps with high throughput. Decentralized and open-source architecture. Computational integrity for secure transactions. By using zero-knowledge technology, transfer costs are significantly reduced, allowing more accessible financial services for mainstream adoption. Computational integrity and on-chain data availability are guaranteed by zero-knowledge-proof technology while preserving the public blockchain properties of Ethereum. Hermez's mission is to create an inclusive, resilient and highly efficient payment network for the next generation of digital currencies to ensure everyone has the freedom to transact.
  • 8
    trinsic

    trinsic

    trinsic

    trinsic connect is a reusable identity verification solution powered by verifiable credentials, digital wallets, and passkeys. Applications can now instantly verify and onboard new users through Trinsic’s reusable identity network. Simplify the user experience with password-less authentication for maximum security with minimum friction. Using zero-knowledge proofs, users can prove things about themselves without oversharing their data. Unlock interoperability for your product without any additional effort on your end. Pre-verified users speed through onboarding helping you acquire more customers at a lower cost.
  • 9
    Build on Bitcoin (BOB)

    Build on Bitcoin (BOB)

    Build on Bitcoin (BOB)

    BOB (“Build on Bitcoin”) is the first EVM rollup stack with native Bitcoin support. Build decentralized apps on top of Ordinals, Lightning, Nostr. Make your EVM smart contract available to 300 million Bitcoin users. Unlock unparalleled liquidity for BTC and stablecoins. BOB is your swiss-army-knife for all things building on Bitcoin: unified wallet experience, trustless bridges, zero-knowledge proofs, cross-chain cryptography, and much more. Bitcoin DeFi, decentralized Ordinals markets, stablecoin payments, gaming or SocialFi - whatever you're building on Bitcoin, BOB has got you covered.
  • 10
    Polyhedra

    Polyhedra

    Polyhedra

    Bringing interoperability and scalability with cutting-edge zero-knowledge proof systems. zkBridge uses zkSNARKs to enable a prover to efficiently convince the receiver chain that a certain state transition happened on the sender chain. zkBridge consists of a block header relay network and an updater contract. The block header relay network retrieves the block headers from the sender chain, generates proofs of the validity of the block headers, and sends the headers along with the proofs to the updater contract (set up on the receiver chain). The updater contract maintains a light-client state. It automatically adds block headers of the sender chain once the associated proofs are verified, and updates the current main chain of the sender chain. Polyhedra Network implements infrastructures for interoperability across heterogeneous systems which guarantee strong security without extra trust assumptions.
  • 11
    Aleph Zero

    Aleph Zero

    Aleph Zero

    Privacy-enhancing public blockchain with instant finality. Aleph Zero is built for enterprise, Web 3.0, and DeFi use-cases. Aleph Zero is a proof-of-stake public blockchain. We combined an original, aBFT consensus protocol with a customized substrate stack. Currently, we’re working on enhancing the platform with a privacy framework based on Zero-knowledge Proofs (ZKPs) and secure Multi-Party Computation (sMPC) to empower developers with a unique approach to private smart contracts. During a laboratory test, Aleph Zero’s peer-reviewed consensus protocol (AlephBFT) achieved 89,600 tx/s with a 416 ms confirmation time in a decentralized test setting of 112 AWS nodes spread across five continents. Aleph Zero’s real-world performance, especially under heavy l network load, is yet to be determined. The Aleph Zero Consensus Protocol has been officially peer-reviewed and accepted for publication in the conference proceedings of advances in financial technology 2019.
  • 12
    Aleo

    Aleo

    Aleo

    Modular and compliant. The ultimate toolkit for building private applications is finally here. World-class infrastructure built for you and your team. From IDE to blockchain and everything in between. Develop with Leo. Write your app using our programming language, with ease. Iterate blazingly fast. Use our platform to compile and test, frustration-free. Deploy to the blockchain. Launch your shiny new app in less time than ever. Discover what we're building for developers like you. Write applications in a breeze with packages from our community on Aleo Package Manager. For the first time, make no compromise between convenience and user privacy. Deploy and share your application on Aleo easily for life. Aleo has put together a solid compiler team to build a very ambitious circuit compiler language. The core aim of this endeavor is to allow developers to make use of zero-knowledge proofs in their applications in as simple a manner as possible.
  • 13
    Loopring

    Loopring

    Loopring

    Loopring is an open protocol for building scalable non-custodial exchanges on Ethereum. Leveraging zero-knowledge proofs (zkRollup), it allows for high performance trading (high throughput, low settlement cost), without sacrificing Ethereum-level security guarantees. Users always maintain 100% control of their assets throughout the trade lifecycle. You can trade on Loopring to test it out. Loopring is an open-sourced, audited, and non-custodial exchange protocol, which means nobody in the Loopring ecosystem needs to trust others. Cryptoassets are always under users' own control, with 100% Ethereum-level security guarantees. Loopring powers highly scalable decentralized exchanges by batch-processing thousands of requests off-chain, with verifiably correct execution via ZKPs. The performance of underlying blockchains is no longer the bottleneck. Loopring performs most operations, including order-matching and trade settlement, off the Ethereum blockchain.
  • 14
    PlatON

    PlatON

    PlatON

    Combining blockchain and privacy-preserving computation technologies, PlatON is building a decentralized and collaborative AI network and global brain to drive the democratization of AI for safe artificial general intelligence. PlatON, initiated and driven by the LatticeX Foundation, is a next-generation Internet infrastructure protocol based on the fundamental properties of blockchain and supported by the privacy-preserving computation network. “Computing interoperability” is its core feature. By building a computing system assembled by verifiable computation, secure multi-party computation, zero-knowledge proof, homomorphic encryption and other cryptographic algorithms and blockchain technology, PlatON provides a public infrastructure in open source architecture for global artificial intelligence, distributed application developers, data providers and various organizations, communities and individuals with computing needs.
  • 15
    Dusk Network

    Dusk Network

    Dusk Network

    Dusk Network is a technology for securities. An open-source and secure blockchain (DLT) infrastructure that businesses use to tokenize financial instruments and automate costly processes. A distributed Financial Market Infrastructure (dFMI) should provide a clear and final settlement of transactions. Moreover, the settlement of transactions should be instant or near-instant (<15s). The popular proof-of-work consensus mechanism used by Bitcoin and Ethereum does not address these requirements. Therefore, we designed a more performant consensus called Succinct Attestation agreement that enables instant settlement of transactions within 15 seconds. Powered by zero-knowledge technology, organizations use the dusk networks to issue tokens that are governed by privacy-preserving smart contracts. Harnessing the power of DLT while respecting confidentiality agreements, and data protection legislation.
  • 16
    BitcoinOS

    BitcoinOS

    BitcoinOS

    BitcoinOS (BOS) is a modular, open source smart contract platform designed to bring scalable, interoperable, and programmable functionality to Bitcoin without altering its base layer. Utilizing zero-knowledge (ZK) proofs through its BitSNARK protocol, BOS enables the execution of smart contracts directly on Bitcoin's mainnet, facilitating decentralized applications (dApps), decentralized finance (DeFi), and trustless cross-chain interactions. BitcoinOS' architecture comprises three layers: the Bitcoin Core base layer, an execution layer that aggregates and compresses transactions, and a compute layer consisting of interoperable rollups called Execution Environment Modules (EEMs). These EEMs support various virtual machines, including Ethereum Virtual Machine (EVM) and Rust-based environments, allowing developers to build applications in multiple programming languages.
    Starting Price: Free
  • 17
    Horizen

    Horizen

    Horizen

    Horizen is powered by the most robust and secure public infrastructure enhanced with multiple security layers. Horizen’s distributed node system ensures the scalability, reliability, security and speed of its network. Horizen is also secured by an improved consensus with enhanced protection against 51% attacks. Horizen’s cross-chain protocol, Zendoo, is designed for developers to build blockchains and applications that solve today’s real-world problems with the flexibility to capture tomorrow’s opportunities. Powered by the Horizen blockchain to leverage the security of a robust PoW public blockchain with the largest distributed node network ensuring maximum reliability and resilience. Zero-knowledge enabled cross-chain protocol allowing auditable and privacy-preserving blockchains - bridging a major gap for real-world adoption.
  • 18
    NymVPN

    NymVPN

    Nym Technologies

    Enjoy secure browsing, streaming, and messaging with our unmatched blend of decentralized VPN, mixnet, and zero-knowledge payments. Elevated privacy with advanced onion encryption, data splitting, mixing, and concealment in cover traffic. Swift two-hop decentralized mode with onion encryption but no cover traffic. Inability to correlate IPs with network requests, by design. No backdoor or covert access to traffic and private data. Unmatched privacy within a single application thanks to the unique blend of mixnet and decentralized VPN. Zero-knowledge payment method, ensuring privacy and concealing user identity for transactions.
  • 19
    Resiliant

    Resiliant

    Resiliant

    Affordable, secure, user centric password-less ID authentication using blockchain and AI technology. Control your digital risk and protect data while locking out undesired users and devices. One-time onboarding for multiple uses across the web, servers, networks and devices. No more passwords, 2FA codes, or matching images, which do not protect the user and enterprise against SIM swapping or false geolocation. Decentralized IdNFT™ gives the user ownership and control of their identity. Secured by blockchain, no private data is stored or uploaded to the cloud. Zero-knowledge proof permits transfer of information without revealing user credentials.
  • 20
    keyhold.io

    keyhold.io

    keyhold.io

    Your clients send credentials via Slack. Your contractors have passwords in email threads. Chaos. keyhold.io is a zero-knowledge secret custody platform for teams who manage credentials that aren't theirs. Send secure request links, collect credentials encrypted before they reach our servers, and get full audit trails of every access. Built for MSPs, agencies, and anyone tired of sensitive access scattered across chat threads.
    Starting Price: £50/month
  • 21
    Orbiter Finance

    Orbiter Finance

    Orbiter Finance

    Orbiter Finance is a decentralized cross-rollup Layer 2 bridge that enables fast and secure asset transfers across different blockchain networks. Designed with scalability and interoperability in mind, it aims to connect Layer 2 solutions like Optimism, Arbitrum, zkSync, and StarkNet, allowing users to seamlessly move assets between these networks with low fees and minimal transaction latency. Orbiter Finance leverages zero-knowledge proofs and other advanced cryptographic techniques to ensure a high level of security, while maintaining a user-friendly interface. It is positioned to support the growing demand for efficient cross-chain transactions, making it a key player in the evolving ecosystem of Ethereum Layer 2 and beyond.
  • 22
    Mina

    Mina

    Mina

    We are the world’s lightest blockchain, powered by participants. Using zero knowledge technology, Mina is creating the infrastructure for the secure, democratic future we all deserve. Build on Mina with zkApps, smart contracts powered by zero knowledge. The SDK, based on Typescript, will be available soon. Users today are compelled to hand over their data to centralized entities in order to participate in the modern world. But Mina’s zkApps, smart contracts powered by zero knowledge, keep users in control of their privacy by validating and sharing proofs of their data, rather than the data itself. Think about getting a loan by simply sharing a proof of your personal ID and credit score, rather than the data itself. No risk of your personal information being hacked or sold. You are the only one owning your data, and it never leaves your device.
  • 23
    Zcash

    Zcash

    Zcash

    Spend it, save it or send it to a friend. Unlike many other forms of payment, Zcash shielded transactions keep all your financial information private and in your control. In addition to using Zcash to pay friends, family and service providers, you can use Zcash at your favorite stores or online merchants. Zcash was the first project to implement zk-SNARKs, a novel form of zero-knowledge cryptography that gives its users the strongest privacy available in any digital currency. Zcash can be purchased on any number of exchanges. Gemini is easy to use and it offers privacy options that others don't. But if Gemini isn't available in your country, there are many other reputable exchanges.
  • 24
    Sphere Identity

    Sphere Identity

    Sphere Identity

    With online forms out of the way, the customer onboarding process is smoothed-out and streamlined. Personal information can be shared and validated seamlessly. Update your subscription as regulations or business requirements change – options range from ‘Zero-knowledge proofs’ to fully-verified documents for KYC compliance. Volume-based pricing lets you pay for the exact data type and quantity your business needs and you can change it as required. Privacy concepts are applied throughout development, during each product’s lifecycle. We take a systematic approach that relies on accepted standards and process frameworks, and are open for external review. Sphere Identity has data protection policies, guidelines and work instructions in place. Every new system, process and policy is adopted by the entire organisation and is monitored throughout its lifetime.
    Starting Price: $1.20 per transaction
  • 25
    PassCamp

    PassCamp

    PassCamp

    PassCamp is a cloud-based password and access management solution that helps teams of all sizes to protect their sensitive information and collaborate efficiently. Since day one the tool has been developed to be the perfect password manager for teams that rely on efficient collaboration. PassCamp is easy to onboard and use for anyone, even non-technical people. The main focus of PassCamp is uncompromised security for your data, that is ensured by end-to-end encryption, two-factor authentication, zero-knowledge proof and other advanced security technologies. PassCamp's unique features like secure multi-tier sharing, history tracking, unlimited guests and super easy-to-use interface help thousands of teams all around the world manage their passwords in a way that improves both security and productivity in their day-to-day activities.
    Starting Price: €2.5 per user
  • 26
    Tierion

    Tierion

    Tierion

    Tierion creates technology and products that reduce the cost and complexity of trust. No need to trust authorities or middlemen. Proofs are independently verifiable forever. Keep an immutable history of business processes. Add a blockchain timestamp proof to digital documents and data. Guarantee the integrity and timestamp of data collected from IoT devices. Prove the existence and accuracy of accounting records. Prove to regulators that your data and documents haven't been altered. Issue blockchain verifiable credentials - from education credits to awards. Leverage the power of the Bitcoin blockchain to prove the integrity and timestamp of data.
  • 27
    PrivMX

    PrivMX

    PrivMX

    PrivMX Fusion is privacy-by-design, all-in-one collaboration software for all kinds of teams, protecting all data with zero-knowledge encryption. With a Fusion of Tools integrated within one digital workspace, it helps teams in organising and managing daily tasks, files and communication in a fresh new way, making it easier to look at projects from various angels. It includes: * group, private an thematic communication within Chat channels; * video calls in private, ad hoc and thematic channels; * async communication with video and audio messages; * easy task management with to-do lists and Kanban boards; * private data storage with smart access policy; * buit-in editor for end-to-end encrypted text notes, mind maps and spreadsheets; * clear 2-dimensional UI architecture; * zero-knowledge encryption of all the content created, uploaded, stored and shared by the team - no third party can access your data; * GDPR compliance within the network of EU-located servers.
    Starting Price: €4 user per month
  • 28
    Cubbit for Teams
    Cubbit for Teams is a SaaS distributed cloud storage that provides businesses with complete security. Thanks to the distributed zero-knowledge network, not even the service provider can access the uploaded files, meaning Cubbit goes beyond the facade of regulatory compliance. Cubbit for Teams reimagines the concept of security by providing an easy-to-use platform: zero-knowledge and end-to-end encryption protects the user as he saves, syncs and shares its data. Information can be accessed from anywhere at any time through the web-app, while employee permissions are managed with the click of a button. Files are shared with no size limit and unsecured email is replaced by Cubbit Private Links: a 100% secure sharing method that matches an encryption key to the folder. Relying on a distributed architecture instead of traditional data-centers allows Cubbit to be cost-effective and provide a significantly cheaper service than the competition. Plus, you will save CO2 per file stored.
    Starting Price: €6 per user, per month
  • 29
    netarx

    netarx

    netarx

    Netarx is a real-time detection platform aimed at defending enterprises against deepfake and synthetic-media threats in voice, video, and email communications. It continuously monitors metadata and content across these channels, issuing intuitive warnings when communications deviate from policy or exhibit suspicious behavior. Netarx supports deployment via cloud, on-premises, or within federated validator networks; includes post-quantum secure options and use of zero-knowledge proofs; and enables organizations to set up multiple sites or divisions with different security profiles. Users receive visible signals in the apps they already use (“flurp” warnings) when something appears off. IT teams gain high-fidelity signals to act on, reducing false positives and providing what is described as a first line of defense against social engineering attacks that exploit AI.
  • 30
    vp.net

    vp.net

    vp.net

    vp.net is a privacy-focused VPN service built on a zero-knowledge architecture and hardware-enforced security that delivers verifiable, end-to-end encrypted connections in which even the service provider cannot identify user activity. It leverages Intel SGX enclaves and attestation services to ensure code execution is genuine and auditable, offering users immutable proof that no logs are maintained and no user data is splintered from their secured session. Performance is optimized via advanced packet-routing technology, which claims markedly faster speeds compared to competitors, while full control is retained locally on the device, ensuring network traffic is anonymized, and any metadata collection is cryptographically impossible. It is designed so that the only entity with visibility into a user’s session is the user themselves, and operations are transparent and verifiable rather than simply promised.
  • 31
    XT.com

    XT.com

    XT.com

    The world's leading digital asset trading platform. Autonomously developed trading matching engine adopts advanced distributed cluster architecture and micro-service development, supporting transactions more than 3 million per second. Unbiased zero-knowledge proof privacy and confidentiality technology protects user privacy. Based on security designs such as multiple signatures, offline signatures, and layered architecture, it uses mature cold and hot wallet separation technologies. Build communities, directly connect customers, make traditional business management more open, and achieve a wider range of business connections. Fully compatible with iOS, Android, Mac & Windows. Now, our operation center include China, Japan, South Korea, Singapore and Hong Kong as centre. More importantly, we are trying to provide a comprehensive service for our clients including media service, group operation, group transaction, online and offline activities in Asian countries and globally.
    Starting Price: 30$
  • 32
    Topos Protocol
    Topos, the first zero-knowledge blockchain ecosystem, will allow you to deploy sovereign execution layers and DApps with native interoperability and cryptographic security. Explore protocol, guides, and references to get up and running on the Topos platform. Topos has something to offer for you. Web3 developers, whether from the Ethereum domain or other popular ecosystems, frequently grapple with inherent platform challenges. Topos is a technology created to alleviate these concerns and more. It is the first ecosystem that offers uniform security across its shards (called subnets), with provable state transition validity and state non-equivocation. Spawn your own subnets, and launch or scale your DApp on them. Implement new types of cross-subnet messages relevant to your DApp. Natively and securely interoperate and compose value with other subnets. Enjoy uniform security across your subnets and all other subnets in the ecosystem.
  • 33
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01
  • 34
    Lockystar

    Lockystar

    Lockystar

    Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive. It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible. Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.
  • 35
    Decide AI

    Decide AI

    Decide AI

    DecideAI is a decentralized AI ecosystem built around three core components that offer a framework for privacy-preserving data sharing, annotation, model training, and continuous improvement using techniques like RLHF and DPO. Decide ID is a zero-knowledge proof-based identity system that verifies contributors’ authenticity and reputation while preserving privacy through techniques like 3D face scans and liveness checks. Decide Cortex provides access to specialized, high-quality LLMs and curated datasets generated through the protocol, enabling clients and developers to adopt or tailor models without starting from scratch. The platform is designed to support secure, verifiable contributions of proprietary or domain-specific data, incentivize long-term participation via its native DCD token, and reduce reliance on large centralized AI providers by enabling on-chain or hybrid model hosting.
  • 36
    Concordium

    Concordium

    Concordium

    A blockchain that’s compliance ready with today’s and tomorrow’s economies. That enables private and public transactions. That offers high throughput, fast transactions, and predictable fees. That allows businesses, developers, and traders to harness blockchain’s true power and potential. Concordium’s decentralised blockchain technology is the first with layer-one ID built into the protocol. This means it offers forward-thinking businesses, application developers, and cryptocurrency traders unrivalled security, privacy, transparency and most importantly, compliance with regulations, if and when these come through. Utilizing zero-knowledge-proofs (ZKP) allows parties to verify information without exchanging or storing that information on-chain other than hash functions, so users can trust that their confidential business will become no one else’s business.
    Starting Price: Free
  • 37
    Enpass

    Enpass

    Enpass Technologies Inc.

    Enpass believes your data belongs to you. Compliance-friendly Enpass Business secures passwords and passkeys in vaults on your organization’s own infrastructure or trusted business cloud, providing greater security than proprietary, SaaS-hosted solutions. Enpass is highly customizable for users, and a powerful Admin Console provides fine-grained control over vault sharing, password generation, and employee security. ISO 27001 certified, zero-knowledge AES-256 encryption on 100% of data.
    Starting Price: $2.99/month
  • 38
    Portabl

    Portabl

    Portabl

    Portabl is redefining what it means to share trusted identity information between financial service providers and the millions of people who count on them. 6 in 10 customers abandon online registration processes. That’s why we made the sign-up process as easy as sign-in. Create 2-touch financial access for any user, anywhere, across Web2 and Web3, and protect your users’ privacy and security while you’re at it. Onboard users in 2 steps and less than 15 seconds using the configurations that work best for your business. Get up and running in minutes with our APIs and SDKs for web and mobile. Validate and verify information with an added layer of security by using zero-knowledge proofs (ZKPs) in place of explicit data. Use globally-recognized standards (OIDC SIOP) to let your users log in with their verified identity over an encrypted channel, eliminating the password risk. Access changes in your customer data as they happen, supported by a tamper-resistant audit ledger.
  • 39
    Arcane Docs
    Arcane Office is a decentralized office suite with high-security and zero-knowledge on your data. With Arcane Office, you have maximum control on your personal stuff. Full-featured online document and spreadsheet editor. Secure storage to save your photos. All free for personal use. Write, edit, and collaborate on a document. Save and secure it on Blockchain cloud storage. GDPR compliant. Decentralized and private. Load & save Microsoft Words and Google Docs.
  • 40
    Hyperledger Indy

    Hyperledger Indy

    Hyperledger

    Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or can be used standalone powering the decentralization of identity. Distributed ledger purpose-built for decentralized identity, correlation-resistant by design. DIDs (Decentralized Identifiers) that are globally unique and resolvable (via a ledger) without requiring any centralized resolution authority. Pairwise Identifiers create secure, 1:1 relationships between any two entities. Verifiable claims are interoperable format for exchange of digital identity attributes and relationships currently in the standardization pipeline at the W3C. Zero Knowledge Proofs which prove that some or all of the data in a set of Claims is true without revealing any additional information.
  • 41
    PassHub

    PassHub

    WWPASS

    Not only are passwords encrypted while stored in PassHub, but they are also only ever decrypted on the user’s device. Client-side encryption means that PassHub never knows your cryptographic key, making it a true zero-knowledge system. Compromised credentials are the cause of over 81% of data breaches. Take control of your business by storing and sharing passwords securely within your team. Use client-side encryption to prevent third -party companies from gaining access to your business credentials and the information you protect. Streamline employee turnover to make onboarding faster, and prevent reassigned employees from having unnecessary access when they leave a role. Help employees create random, high-strength passwords for all business websites and applications, and store and share them securely.
  • 42
    Chainpoint

    Chainpoint

    Chainpoint

    Anchor an unlimited amount of data to the Bitcoin blockchain. Verify the integrity and existence of data without relying on a trusted third-party. Chainpoint links a hash of your data to a blockchain and returns a timestamp proof. A Chainpoint Node receives hashes which are aggregated together using a Merkle tree. The root of this tree is published in a Bitcoin transaction. The final Chainpoint proof defines a set of operations that cryptographically link your data to the Bitcoin blockchain. A Chainpoint proof contains the information to verify that the hash of some data is anchored to a blockchain. It proves the data existed at time it was anchored. Chainpoint proofs can be verified without reliance on a trusted third party.
  • 43
    Tuta Calendar
    Tuta Calendar is a zero-knowledge calendar with quantum-safe encryption, ensuring that all your events are protected from snooping and prying eyes. Whether you schedule events, receive event invitations, or share your calendar with others, all steps in the Tuta Calendar are automatically encrypted end-to-end. This means your data belongs to you, and no one else can access it. The intuitive, clean design allows for easy organization of appointments, business meetings, and repeating tasks. Push notifications are sent securely, so no third party can track you. Two-factor authentication can be enabled to protect your login credentials from malicious attacks. Tuta Calendar is available with free and open source desktop clients. You can share calendars and events with your family, organization, or company with a few taps.
    Starting Price: €3 per month
  • 44
    Aranda Data Safe

    Aranda Data Safe

    Aranda SOFTWARE

    Aranda Data Safe is a comprehensive platform for centrally managing, backing up, protecting, and seamlessly migrating your data and endpoint devices. It offers automated hardware and software inventory, providing detailed information on devices, installed applications, and storage requirements. The Discovery Agent allows for unlimited deployment across devices, facilitating global-scale data analysis and reporting. Automated backups ensure secure, centralized data protection, with granular policy control enabling customization by branch, user, or department. It employs global source-based deduplication for efficient storage and minimal network impact, and utilizes zero-knowledge encryption key management for enhanced security. Fast and reliable data recovery is supported through independent snapshots and self-service restoration. Aranda Data Safe also addresses risks in collaborative SaaS environments, offering optimized Outlook PST file backups.
  • 45
    Arcane Office
    Arcane Office is a decentralized office suite with high-security and zero-knowledge on your data. With Arcane Office, you have maximum control on your personal stuff. Full-featured online document and spreadsheet editor. Secure storage to save your photos. All free for personal use. Write, edit, and collaborate on a document. Save and secure it on Blockchain cloud storage. Make a spreadsheet and save it to Blockchain secured cloud storage. Collaborate with anyone on any devices. Encrypted storage with Blockchain security to back up your photos and access them on all your devices. Hide or Mark up important details of your image by simply clicking and dragging on it.
  • 46
    TheSecureNote

    TheSecureNote

    TheSecureNote

    TheSecureNote is a privacy-first notebook built for people who take their personal data seriously. Unlike conventional note-taking apps, it uses zero-knowledge encryption — everything is encrypted directly in your browser before it ever leaves your device. Your password never touches the servers, and your notes are stored as unreadable encrypted data. No accounts. No email required. No trackers. Whether you're storing passwords, journaling privately, saving business ideas, or writing sensitive information, TheSecureNote gives you a safe, minimal, distraction-free space — built on the belief that privacy should be the default, not a premium feature.
    Starting Price: $10 for Lifetime
  • 47
    Scroll

    Scroll

    Scroll

    Scroll is designed by and for Ethereum developers. A swift, reliable and scalable Layer 2 blockchain, Scroll extends Ethereum's capabilities, enabling apps to scale without any surprises. Thanks to bytecode-level compatibility, existing Ethereum apps can migrate onto Scroll as-is, and at a significantly reduced cost. Our open development approach combines the best ideas among value-aligned contributors and leads to more secure and better-designed systems. Scroll is forging a community-driven path to redefine and evolve Ethereum’s roadmap. Scroll uses advanced zero-knowledge-proof technology, battle-tested EVM models, and rigorous audits to ensure that our foundation is rooted in security and reliability. By prioritizing code security through open source collaboration, Scroll protects our developers and users against vulnerabilities.
  • 48
    Fortva

    Fortva

    Fortva

    Fortva is a cloud-based document management (DMS) and contract lifecycle management (CLM) platform that helps businesses organize, secure, and manage documents and contracts in one place. It supports the full lifecycle—from creation and collaboration to approval, e-signature, and storage. Features include workflow automation, version control, redlining, audit trails, and secure sharing. Fortva uses AI-powered OCR and data extraction to automate processes and generate insights. With zero-knowledge encryption, role-based access, and SSO, it ensures strong data security and compliance. Integrations with tools like Docusign, Microsoft Word, Salesforce, HubSpot, and Zapier connect documents to business workflows.
    Starting Price: $299/year
  • 49
    Teammato

    Teammato

    Teammato

    In high-performance teams, the most valuable feedback is often the hardest to share. Teammato is an enterprise-grade, anonymous surveys and feedback platform built natively for Slack to eliminate social friction and build high-trust cultures. Unlike simple polling bots, Teammato is a robust feedback orchestration engine. We believe that in anonymity, "the tech is the trust." Our infrastructure features strict schema-level data isolation, advanced privacy-hardening to prevent PII leakage, and zero-knowledge architecture. Key Features: Native Slack Integration: No new apps or logins; stay in your workflow. Absolute Anonymity: Engineered protocols ensure every voice is heard safely. Pulse Surveys: Automated checks on team sentiment and psychological safety. Actionable Insights: Transform raw feedback into clear organizational themes.
    Starting Price: $49/month
  • 50
    TALONOID Vault

    TALONOID Vault

    TALONOID Technologies

    TALONOID Vault was born from a need to create a privacy-centric, cross-platform cloud solution that doesn’t treat data like a product. Developed by TALONOID® Technologies, the Vault was envisioned to empower users with true ownership of their digital content. TALONOID Vault offers Secure Cloud Storage & Backup for iPhone. Easily back up, sync, and access your photos, videos, and files anytime, anywhere. Take full control of your data with zero knowledge encryption. 🌟 iPhone Backup Made Easy – Securely back up photos, videos, documents and more with one-tap cloud sync. 🔗 Smart NFC Capsule – One tag for instant app launch, one rewritable for 2FA codes or passphrases. 🌍 Access Anywhere – Restore files, auto-sync camera roll, and view data offline. 🛡️ Privacy-First Design – End-to-end encrypted, zero-knowledge, no ads or tracking. 💎 Expert Support Included – Get live chat and ticketing assistance when using your TALONOID device.