Eliminating the honeypot risk. Changing how individuals share information with organizations through cryptography and zero-knowledge proofs.
Why traditional identity is broken
Users surrender raw personal data (PII) to centralized databases every time they sign up for services.
These databases become "honeypots" - when hacked, millions of records are exposed, leading to massive fines and user damage.
Breach-Nullification: Organizations never store raw personal data. Stolen data becomes worthless through cryptography.
The Trust Triangle Architecture
SELA eliminates the "honeypot" risk by ensuring that no organization ever stores the users raw personal data. This revolutionary approach is achieved through our Trust Triangle Architecture.
The SELA App turns the users phone into a Personal Vault. All data is encrypted and stored locally. The user is the sole owner of the cryptographic keys.
Our AI/OCR service verifies the users ID/Passport once, discards the physical document, and issues a permanent, tamper-proof Verifiable Credential (VC) to the users phone.
The organization that needs to verify the user receives encrypted, signed data that only they can decrypt using their private key, then immediately discards it.
Data is locked using the Verifiers public key, readable only by them
Prove facts ("I am over 21") without disclosing underlying data
Polygon Amoy blockchain acts as immutable directory, storing zero PII
24-word seed phrase + Social Recovery with trusted Guardians
Comprehensive identity solutions for every use case
Consumer Identity Wallet
The core "remote control" for the users digital life. Holds keys, credentials (VCs), and biometric access.
Encrypted Data Vault
Zero-Knowledge Storage service where even DaTamoon cannot see the data, but users can retrieve it if they lose their phone.
Breach-Proof CRM
B2B product replacing traditional SQL databases. A ledger of links (DIDs) and proofs, not raw data.
Enterprise Verification Node
On-premise or cloud software package for large organizations to verify SELA Wallets locally within their firewall.
Physical Access Control
NFC/Bluetooth reader replacing keycards and badges. Verifies employee or member status in 0.5 seconds.
Patient Data Interoperability
HIPAA-compliant standard for handling sensitive health records. Patients carry Medical Summary VCs between providers.
KYC/AML Compliance
Fintech solution handling heavy regulation. Users can "port" their KYC from one institution to another instantly.
Digital Car Key
Integration with car manufacturers and rental fleets. Phone is the key, with drivers license and insurance verification.
IoT Identity (IDoT)
Giving identity to machines. Smart cameras, drones, and industrial robots get SELA DIDs for secure authentication.
Anti-Scalping Ticketing
Tickets issued as VCs bound to users biometrics. Cannot be resold by bots. Tap phone to enter.
Invisible Check-In
Combines ID verification + Payment + Room Key. Verify passport 24h before arrival, walk in and unlock room automatically.
Real-Time Authenticity Engine
Anti-Deepfake protocol. Cryptographically "sign" moments in timevideo calls, voice messages, documentsproving authenticity.
Built on cutting-edge cryptographic principles
Polygon Amoy (Layer 2) blockchain acts as the immutable directory. Records public identities (DIDs) but stores zero PII.
Relayer Server function automatically pays gas fees, ensuring seamless registration transactions.
Patentable Dual-Method Recovery: 24-word seed phrase + smart-contract-based Social Recovery with trusted Guardians.
End-to-end encryption using AES-256 algorithms with military-grade protocols protecting all data in transit and at rest.
Ready to eliminate the honeypot risk?
Hasadnaot 11, Herzliya, Tel-Aviv District, Israel
Telephone: +972(9)744-1117