Inspiration

EnKrypto was inspired by a real and recurring failure during high-stakes scrutiny such as startup due diligence. When investors ask when data existed, whether it changed, and who controlled it, founders are forced to rely on internal logs and cloud audits—both self-reported and non-independent. The absence of neutral, pre-existing proof motivated the idea of creating evidence before it is demanded.

What it does

The core learning was that the problem is timing, not tooling. Traditional cloud systems optimize for storage and availability, not for acting as an independent witness. Once scrutiny begins, clean proof is already compromised. We learned that cryptographic primitives, when combined with immutable time anchoring, can function as a digital notary without storing or accessing sensitive data.

How we built it

EnKrypto was designed as a minimal, vendor-neutral proof infrastructure:

  • Data is converted into a deterministic cryptographic fingerprint using SHA-256.
  • The hash is time-anchored onto an immutable public ledger (Polygon).
  • No files are stored, and no content is accessed.
  • A public verification API allows any third party to independently verify proofs. Mathematically, integrity is ensured by generating a cryptographic hash of the data and binding it with a publicly verifiable timestamp. The proof is created by combining the hash of the data with the timestamp, ensuring that the data existed at that specific time and has not been altered since.

Challenges we ran into

The primary challenge was designing trust without custody—creating strong guarantees while explicitly avoiding file storage, content access, or subjective judgment. Another challenge was aligning the system with real enterprise workflows, ensuring it fits naturally into due diligence, audits, and compliance checkpoints rather than requiring behavioral change.

Accomplishments that we're proud of

  • Designed a neutral digital notary that creates proof without storing files or accessing content.
  • Built an append-only, tamper-evident proof flow anchored to a public blockchain.
  • Achieved independent verification usable by investors, auditors, and legal teams.
  • Aligned the system with real due-diligence and compliance workflows, not daily usage.

What we learned

  • Evidence must be created before scrutiny begins; post-facto proof is inherently weak.
  • Cloud logs are insufficient as trust anchors because they are self-reported.
  • Minimalism increases trust: removing storage, access, and judgment strengthens credibility.
  • Cryptography + time anchoring can replace institutional trust with verifiable facts.

What's next for EnKrypto

  • Expand verification APIs for broader enterprise and legal integrations.
  • Add support for more certification checkpoints (audits, compliance events).
  • Strengthen ecosystem adoption by positioning EnKrypto as a standard proof layer.
  • Explore global markets where high-stakes data integrity is mandatory.

Built With

  • append-only-proof-registry
  • blockchain
  • immutable-ledger-infrastructure
  • javascript
  • node.js
  • polygon
  • public-verification-api
  • sha-256-cryptographic-hashing
  • vendor-neutral
Share this project:

Updates