Utilizing the DID protocol to enable self-sovereign identity, permissions, and authorization systems
The trust layer
for your data
Trust Protocol uses the security and decentralized resilience of a distributed network to imagine and enforce new possibilities of user-centric data storage and management.

Wield the power to
permit and protect
Identity Management
Access Control & Policy
Developers can create and enforce trustless access policies like never before, easily enacting complex permissions protocols.
Anchoring & Auditing
Achieve organization and maintain security, from tracking access history, to assessing document versions and changes.
Robust Ecosystem
Trust Protocol blends the benefits of a distributed network, with DefraDB’s database management capabilities, to realize our data management vision of interoperability, privacy, and ownership.
Under the hood

Store your secrets
easily and effectively
Our Secrets Engine is the nucleus of security and accessibility in the Source ecosystem. Both proxy and threshold encryption helps developers leverage unyielding cryptographic power, without sacrificing end user experience.
We built our Zero-Knowledge Key Management System to relieve users of the burdens of public key cryptography. The ZK-KMS allows them to login to apps built with Source as they would any other site, but with the backing of a secure cryptographic key, rather than their mother’s maiden name.


Let's Collaborate
Interested in Source technologies?
We’re always looking to forge new partnerships.