DaTamoon Ltd.

SELA
Breach-Nullification
Digital Identity Platform

Eliminating the honeypot risk. Changing how individuals share information with organizations through cryptography and zero-knowledge proofs.

The Holder
(Hidden User)
The Issuer
(Identity Service)
The Verifier
(Requester)

The Core Problem

Why traditional identity is broken

The Problem

Users surrender raw personal data (PII) to centralized databases every time they sign up for services.

The Risk

These databases become "honeypots" - when hacked, millions of records are exposed, leading to massive fines and user damage.

The SELA Solution

Breach-Nullification: Organizations never store raw personal data. Stolen data becomes worthless through cryptography.

How SELA Works

The Trust Triangle Architecture

Authority through Cryptography

SELA eliminates the "honeypot" risk by ensuring that no organization ever stores the users raw personal data. This revolutionary approach is achieved through our Trust Triangle Architecture.

1

The Holder (User)

The SELA App turns the users phone into a Personal Vault. All data is encrypted and stored locally. The user is the sole owner of the cryptographic keys.

2

The Issuer (SELA Identity Service)

Our AI/OCR service verifies the users ID/Passport once, discards the physical document, and issues a permanent, tamper-proof Verifiable Credential (VC) to the users phone.

3

The Verifier (Requester)

The organization that needs to verify the user receives encrypted, signed data that only they can decrypt using their private key, then immediately discards it.

Asymmetric Encryption

Data is locked using the Verifiers public key, readable only by them

Zero-Knowledge Proofs

Prove facts ("I am over 21") without disclosing underlying data

Blockchain Anchor

Polygon Amoy blockchain acts as immutable directory, storing zero PII

Dual-Method Recovery

24-word seed phrase + Social Recovery with trusted Guardians

SELA Products & Solutions

Comprehensive identity solutions for every use case

📱

SELA APP

Consumer Identity Wallet

The core "remote control" for the users digital life. Holds keys, credentials (VCs), and biometric access.

  • ID storage
  • ZKP generation
  • P2P verification
  • Guardian recovery
☁️

SELA CLOUD

Encrypted Data Vault

Zero-Knowledge Storage service where even DaTamoon cannot see the data, but users can retrieve it if they lose their phone.

  • Encrypted sync across devices
  • Heavy document storage
  • Secure backup
🗄️

SELA DATABASE

Breach-Proof CRM

B2B product replacing traditional SQL databases. A ledger of links (DIDs) and proofs, not raw data.

  • GDPR-compliant by design
  • "Forget me" automation
  • Query without holding data
🖥️

SELA SERVER

Enterprise Verification Node

On-premise or cloud software package for large organizations to verify SELA Wallets locally within their firewall.

  • High-speed verification
  • Audit logging
  • LDAP/AD integration
🚪

SELA ENTRANCE

Physical Access Control

NFC/Bluetooth reader replacing keycards and badges. Verifies employee or member status in 0.5 seconds.

  • Offline capability
  • Anti-passback
  • Dynamic access revocation
🏥

SELA MEDIC

Patient Data Interoperability

HIPAA-compliant standard for handling sensitive health records. Patients carry Medical Summary VCs between providers.

  • Break-glass emergency access
  • Doctor-to-doctor secure sharing
  • No fax machines needed
🏦

SELA BANK

KYC/AML Compliance

Fintech solution handling heavy regulation. Users can "port" their KYC from one institution to another instantly.

  • Source of Funds proof
  • Credit Score VC
  • Instant account onboarding
🚗

SELA AUTO

Digital Car Key

Integration with car manufacturers and rental fleets. Phone is the key, with drivers license and insurance verification.

  • Shareable keys (time-limited)
  • Fleet management
  • Insurance verification
🔌

SELA DEVICE CONNECTION

IoT Identity (IDoT)

Giving identity to machines. Smart cameras, drones, and industrial robots get SELA DIDs for secure authentication.

  • Device-to-Device authentication
  • Firmware integrity checks
  • Secure command verification
🎫

SELA TICKET

Anti-Scalping Ticketing

Tickets issued as VCs bound to users biometrics. Cannot be resold by bots. Tap phone to enter.

  • Bot prevention
  • Secure secondary market
  • Dynamic QR codes
🏨

SELA HOTEL

Invisible Check-In

Combines ID verification + Payment + Room Key. Verify passport 24h before arrival, walk in and unlock room automatically.

  • Passport-less check-in
  • Automatic room access
  • Automated billing
🎥

SELA LIVE

Real-Time Authenticity Engine

Anti-Deepfake protocol. Cryptographically "sign" moments in time€”video calls, voice messages, documents€”proving authenticity.

  • Live Verify P2P
  • Deepfake Shield for Enterprise
  • Content Signing (C2PA)

Technology Edge

Built on cutting-edge cryptographic principles

Blockchain Anchor

Polygon Amoy (Layer 2) blockchain acts as the immutable directory. Records public identities (DIDs) but stores zero PII.

Reliability

Relayer Server function automatically pays gas fees, ensuring seamless registration transactions.

Recovery

Patentable Dual-Method Recovery: 24-word seed phrase + smart-contract-based Social Recovery with trusted Guardians.

Military Grade Security

End-to-end encryption using AES-256 algorithms with military-grade protocols protecting all data in transit and at rest.

Get in Touch

Ready to eliminate the honeypot risk?

DaTamoon Ltd.

Hasadnaot 11, Herzliya, Tel-Aviv District, Israel

Telephone: +972(9)744-1117