TAI_headerbackground.jpg

Unimagined Privacy and Freedom for your Private Digital Life

 
 

We are building a 2mm-thin personal computer, lodged inside a stylish leather wallet, that brings unimagined freedom and peace of mind to the private social and business digital life of the most targeted 1%.

 
 
 

 

 
 
 

PROBLEM

Cybersecurity is the 2nd concern of high net-worth individuals
after “their country politics”.

(source: 2019 UBS Group survey)

+

Cybersecurity is the 1st concern of family offices, followed by “market volatility and geopolitical uncertainty”

(source: 2020 Nortner Trust survey)

=

Nothing money can buy : a huge unmet demand.

 

An iPhone and top secure messaging apps are a blessing to protect ordinary citizens from mass surveillance and targeted hacking by small and mid-level hackers.  Yet, even a secured iPhone can be undetectably hacked by dozens of actors, and those renting their services, and apps cannot be more secure than the device they run on. 

This leaves hundreds of thousands of law-abiding journalists, activists, politicians, top executives wealthy individuals, and family offices - and their close business and personal associates - vulnerable to illegal undetectable hacking by criminals, adversaries, and states. 



Source of THE Problem

Hyper-complexity of systems & supply-chains.
Obscurity in hardware, software & fabrication.
Blind Trust in organization, people & systems.

But then is it really a technical problem?

problem section.jpg

Everything is overly complex and broken by design, by powerful nations
to retain investigative capabilities to prevent grave crimes

Solution

We are therefore building the first ultra-secure messaging and social computing platform, around an ultra-secure cloud, and a 2mm-thin personal computer that you and your close associates will carry embedded in stylish custom leather wallets. 

We ensure previously unimagined levels of privacy and security - and a transparent in-person solution to the need for legitimate and lawful access - via an uncompromising zero-trust approach down to CPU design, chip fabrication oversight, and data room access, as validated by a highly democratic and resilient Trustless Computing Certification Body, being promoted by our non-profit arm. 

Initially reserved for clients and executive staff of private banks, family offices, UHNWIs and enterprises, it seamlessly enables ultra-secure messaging, social networking, transactions, and dozens of 3rd-party apps. You can communicate and network with freedom and peace of mind with your close family, personal, business associates, as well as sign contracts, and engage in e-banking, and more with dozens of third-party apps.

FEATURES & APPS

 

A minimal code base, UI and features enable a stylish, lean and fast user experience,whilst enabling independent code security reviews, providing true assurance of its integrity and security. 

 
pod ui feature messaging.jpg

Messaging, Social & Networking

Ultra-private one-to-one and group messaging, networking and discussion groups, in isolated professional or social virtual spaces. Be part of the most exclusive and private online social network.

pod ui feature Transactions.jpg

Private e-Banking

Enables our partnering global private banks to replace their clients (and employees) hardware authentication devices, bank/credit cards, and mobile apps with a single 2mm-thin personal computer. It provides full e-banking access, direct payments, physical facility access, multi-factor authentication, as well as new financial apps and services that are currently not offered digitally for their security and confidentiality needs.

pod ui feature co-editing .jpg

Collaborative Text Editing

Ultra-secure and confidential collaborative text editing to negotiate sensitive agreements and digitally sign them in compliance with the highest legal standards, including eIDAS Qualified and the upcoming Swiss eID LoT3.

seevik_store_site.png

Seevik App Store

Anyone will be able to submit an app to the Seevik App Store using our minimal SDK, as long as it is approved for security by the Trustless Computing Certification Body. Password manager, personal journal, cryptocurrency wallet are just some of the apps that will be available. An ultra-secure e-health tracker and assistant will leverage extensive behavioural biometric that data that is continuously saved (only on device)

Why is it so Secure?

 

We re-conceptualize IT security as the by-product of governance processes. We achieve radically-unprecedented levels of trustworthiness by ensuring that any software, hardware and process that is critically-involved in the entire life cycle and supply-chain will uniquely comply to this 4 principles:

 
 
 

Mission 

The future wellbeing of humanity rests primarily on the expansion of democracy and liberty to the global level, and to our digital spheres of information and communication.

Nothing less can ensure that we and our close ones will have access to IT that guarantees meaningful levels of privacy, security, freedom of information, and freedom of assembly.

 
 

Seevik Wallet

 

For optimal ergonomics and portability, Seevik Pod users will carry it in a custom leather wallets add-on hand-crafted leather woven into carbon fiber. It will hold the Pod, up to 6 cards/ IDs and 15 cash bills, and 10 coins With RFID blocking. It also comes in 20 different styles for all tastes.

 
 

The Seevik Phone

 

Once market-proven with 10.000 units, the Seevik Pod will be embedded in the back of a 5.5mm-thin top-end Android smartphone, made with a partner, while maintaining completely separate supply chains until the last weeks of assembly, for utmost security levels.

 

Video of our Functional Proof-of-concept Device of Seevik Phone, built over a Nubia Technologies hardware platform.

seeviphone.jpg

TEAM

A consolidated group of leaders in entrepreneurship, cybersecurity, and hardware manufacturing. Supported by resilient supply-chain partnerships.

 
Rufo Guerreschi

Cofounder & CEO (Zurich)
Over 20 years of experience as a leading-edge digital security, democracy and civil rights entrepreneur and activist. Founder of the Trustless Computing Association and creator of the Free and Safe in Cyberspace event series. Founder of the open-source e-democracy startup Participatory Technologies, sold in 2006 to private equity. As head of EMEA Business Development at 4thpass, acquired by Motorola, he sold +$10M mobile app store systems to top mobile network operators. As CEO at Open Media Park, he brought the valuation of a planned IT/media park from €3m to €21m, slated to be EU’s 2nd largest. Masters’ at Rutgers University. Graduate studies at Princeton.

Joonyoung Park

Chief Technology Officer (Seoul)
Formerly co-managing director of JRC, a family-owned 200M$/yr 6-sigma electronics manufacturing plant (EMS) in South Korea. Was Chief of Engineering Staff at LG Solutions, and Principal Staff System Engineer Motorola. Lead at Kudelski a 30-staff team in Palo Alto for new HW products from concept to manufacturing.

[Confidentail Name]

Cofounder & Chief Security Officer (Zurich)
For a decade, as CISO, he led strategy and management of cybersecurity and IT risk programs for large corporations, working at global consultancies, a private bank, a World leader in logistics, and a leading blockchain startup. Has over 10 IT Security certifications.

 
Alex Laptev

UX & UI Lead (Geneva)
Senior UX & UI Designer. Specialized in mobile banking. Worked for Lombard Odier and Thomson Reuters. Founded and exited 2 startups in the area of specialized hardware for virtual reality.

Paul Foster

Deputy Head of Business Development (London)
Innovator and technology evangelist, a cybersecurity expert with over 25 years of banking experience. Formerly Global Head of Endpoint Security at HSBC, the World 2nd largest non-Chinese bank. Responsible for the endpoint on all platforms, including virtualization security and strategy globally, and direct interface with customs security solutions by Crowdstrike, Menlo and Tanium.

[Confidential Name]

Head of Engineering (Zurich)
Has 25 years of experience in the design of secure hardware, software, firmware in security-critical domains. Two years in Shenzhen working on high-security physical security IoT devices in civilian and military sectors. Responsible for hardware and software architecture, R&D, integration and engineering.

Keshaw Singh

Design Manager (New Delhi)
Highly talented and multi-versed digital graphics artist and consumer electronics designer. Specializes in designing and coordinating advanced design and communications projects integrating computer graphics, UI design, Web and mobile app design, visual effect & video post-production.

 

ADVISORS