
Blockchain security solutions
With the world slowly realizing that cryptocurrencies, tokenized assets and smart contracts are the new wild west of financial instruments, threats come as well. Regulatory pressure and cybersecurity risks are harder to mitigate when your technological stack is novel and based on new cryptography-based technologies. Our solutions enable compliance with regulations such as GDPR, CCPA and completion of Privacy Impact Assessment (PIA), Data Protection Impact Assessment (DPIA).
Cryptocurrencies require combining novel cryptography with traditional data, application and product security expertise to solve blockchain security issues.
Blockchain security challenges
Blockchain security is hard
With only a bit more than a decade in the making, the cryptocurrency industry still lacks foundations of "acceptable security" and people with enough experience in traditional security as well as "cutting edge" developments.
Poorly implemented crypto and appsec
Components of cryptocurrency systems, especially non-custodial wallets and blockchain nodes, require appsec and datasec measures: protect stored data, prevent unauthorized transactions, stop malicious users.
Transaction and smart-contract privacy
Building cryptographic protocols that enable efficient transaction and smart-contract privacy is hard and requires specialized expertise and team.
Scalability
Making the current generation of blockchain systems scalable and fast requires novel cryptographic solutions that balance security with understanding how the system will run globally under millions of transactions.
Modern blockchain security solutions
ZKPs: SNARKs, SNORKs, STARKs
Non-interactive zero knowledge protocols enable many essential properties in blockchains. Designing instrumentation around them is complicated but crucial.
Traditional security
Blockchain systems often need to combine novel cryptography and traditional application security measures.
Custom cryptosystems and primitives
Blockchains rely on a number of custom cryptosystems and crypto-primitives, which enable scalability and integrity.
Tools and services we offer
Transaction privacy and ZKP
We specialise in designing privacy-oriented cryptographic layers based on zk-SNARKs and multi-party computation protocols.
Novel cryptography
Our team of experienced cryptographers implements complex cryptographic protocols: zero-knowledge proofs, custom curves/signatures, SMPC, homomorphic operations.
Blockchain security
We design & implement traditional application security, data security and infrastructure security measures for crypto wallets, blockchain nodes, and backends.
Auditing and reviewing
We perform security audits and design reviews of crypto wallet security and blockchain security issues. We define their fitness against threat models and suggest improvements.
Have a question? Get a human to answer it!
How we make a difference
Cryptographic expertise
We employ experts with a traditional academic and practical cryptographic background. We maintain open-source cryptographic libraries and share our applied research in whitepapers.
Experience with typical constructions
We have developed production-ready zk-SNARKs implementations, private transactions, multi-signature schemes, and other blockchain-specific cryptosystems.
Real-world crypto
Aside from good niche expertise in blockchain, we have implemented and secured cryptographic controls in many instances β from building end-to-end encrypted applications to DRM-like ML protections.
Our mission is simple.
We help you focus on serving your customers better, while relieving your team from security engineering pains and making your users confident that their data is safe with you.
Contact us
There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:
Relevant stories and posts

Crypto wallets security as seen by security engineers
Read about building secure crypto wallets and issues we found when doing crypto wallet security audits. Hot non-custodial wallets store private keys, sign crypto transactions, and claim to be secure. But are they?

Zero Knowledge Protocols without magic
Zero Knowledge protocols are often used for authentication, as they allow two parties to verify whether they share the same secret without revealing it. We explain different use cases and how to use them on practice.

Security of React Native libraries: the bad, the worse and the ugly
How to select a secure React Native library for your app. Sort out improper platform usage, easy to misuse API, deprecated and abandoned libraries β check our research of the React Native ecosystem security.