Leaders in blockchain-based data certification

We leverage blockchain technology to ensure the existence, integrity and attribution of communications, processes and data important for your organization.

Reasons to use bitstone.net

Ultimate Security

No more need for trust in insiders or third parties. We replace trust with mathematical proof.

Total Accountability

For the first time in human history, an immutable layer of transparency removes friction from your auditing process.

Strong Attribution

Track any action to its source, securely and transparently, in a way which can be seamlessly and independently audited.

Better Digital Evidence

Blockchain-based hashing and time stamping make for exceedingly strong evidence of the authenticity of a document.

Forensic Auditability

All evidence and audit trails generated by bitstone.net are 100% counterfeit-proof and verifiable by independent third parties.

Infinite scalability

Thanks to our technology, we can stamp up to exabytes of data and embed it on both the Bitcoin and Ethereum blockchains. We also have a public API.

Generate immutable and independently verifiable records of everything that is important to your business

bitstone.net API

Connect your application to the Ethereum and Bitcoin blockchains using BTA, our unique underlying technology.

Crypto Sign

The smartest platform for seamless data certification is now in your hands.
No limits, for free.

Trailbot

Be in control of your data.
React in real-time to potentially unwanted manipulation of your files and logs

Estonian ID Integration

Authenticate yourself on “verify.lirax.org” (active from 7.12.2018)

A new security paradigm

Certify and authenticate any kind of data without relying on trusted third parties.

Proof of Ownership

Attribution and audit trails that can be independently verified

Proof of Integrity

Monitor your data in real time to ensure it has not been tampered with

Proof of Existence

Certify that a file, dataset or communication existed at a certain point in time

Proof of Receipt

Certify that a specific recipient read your email at a certain point in time

Tommaso Bianchi
Partner @ Consorzio Fibonacci A.

I believe that blockchain technology can be a powerful evidentiary tool

Blockchain technology like bitstone.net can change the way that companies think about their middle-and back office. Today, they can be centers for liability and risk. Errant employees, misapplied retention policies, and even just the simple passage of time can corrupt business records. The Blockchain can ensure that changes in state are tracked, recorded and sometimes even prevented. From the perspectives of investigation and e-discovery, this can be a powerful evidentiary tool.

Benefits of our technology

  • Security

    Your records are secured by the most powerful network in the world: there’s no root access to the blockchain

  • Privacy

    Your data never leaves your premises: only unique identifiers are embedded in the blockchain

  • Transparency

    Data can be independently authenticated and verified and changes can be monitored in real time

  • Global Reach

    Cryptographic representations of data are distributed in thousands of nodes, worldwide

  • Forensically Auditable

    Blockchain-based hashing and time stamping ensures irrefutable evidence of the existence and the integrity of data

Security
The databases used by Bitstone.Net (the Ethereum blockchains) are secured by a network of thousands of computers distributed around the world. Each one of these computers commits its computational power to make these databases secure and immutable. This is the most powerful computer network in the world! There is no supercomputer on Earth that could provide enough power to hack this database.
Privacy
Is any of my data publicly visible? No, we use cryptography algorithms to register just a unique identifier of your data and we embed such identifier in the blockchains. There is no way to reconstruct the content from any identifier because we use one-way cryptographic functions (hashes).
Transparency
Both the Bitcoin and the Ethereum blockchains are fully distributed, permissionless and transparent: anyone can access them from anywhere in the world. While the content is not stored in the blockchains, the proofs of the integrity, existence and ownership of such content can be independently verified by anyone, whether it be a sysadmin, a judge in court, a digital forensic or a lawyer. Also, these proofs will remain stored in the blockchain forever, even if Bitstone.Net disappears.
Global
Authentication systems used to be local. With Bitstone.Net the properties of the tracked data can be independtly verified from anywhere in the world, even if the data is spread internationally among many organizations.
Legal validity
In United States Federal Courts, blockchain-based hashing and time stamping can make for exceedingly strong evidence of the authenticity of a document. Computer file hashes are widely-accepted by technology experts and the federal courts as reliable indicators of document identity. Scaled blockchains are widely-accepted by technology experts and academics as reliable data sources. Taken together and applied to the recordation of important documents using Bitstone.Net, these technologies can make for a persuasive showing that a disputed document is identical (or not identical) to an original document. Though there is significant legal precedent for the reliability of hash values, there is little legal precedent for the reliability of blockchains.

Thus, expert testimony may be required to rebut any objections to the admissibility of Bitstone.Net’s cryptographic proof document. Because of the broad acceptance by technological experts and academics of the reliability of scaled blockchains as data sources, such objections will probably not be successful. However, the selection of a qualified expert witness in cryptography will be essential to the first cases testing this position. In subsequent disputes, expert witnesses may not even be required.

Bitstone.Net API

Bringing unlimited data anchoring to the most powerful blockchains in the known universe

Bitstone.Net API makes the most secure Lirax Blockchains meet unlimited data anchoring.

We use the Ethereum blockchains to ensure the existence, integrity and attribution of all the data that is crucially important for our customers.

The Bitcoin blockchain has a ~$6,000,000,000 bug bounty attached to it and yet there has never been a security breach since its public use in 2009.

The Ethereum blockchain is the forefront of distributed ledger technology allowing Bitstone.Net to achieve extremely fast settlement times.

Both blockchains are powered by thousands and thousands of computers all around the world, and that’s why public blockchains are so secure. In order to modify a transaction confirmed in the last ~10 minutes, an attacker would need to spend hundreds of millions of dollars in computing power—and that cost increases exponentially with time.

However, for technical reasons, public blockchain technology only allows a very limited amount of transactions per second (~2.5 in the case of Bitcoin). Furthermore, you can only embed up to 80 bytes (a short phrase) on it.

Blockchain Timestamping Architecture

Bitstone.Net API opens a new world of possibilities by overcoming all the limitations inherent to public blockchains and allowing timestamping and anchoring of an unlimited amount of data.

Using our patent pending technology we are able to process up to 10⁹ data sets/second, extract their unique secure cryptographic identifiers, build a cryptographic tree with all this data in real time and publish the result to both the Bitcoin and Ethereum blockchains.

For each individual dataset, we generate and provide a proof document that is everything you or any independent verifier need in order to prove that the given dataset was indeed stamped.

We provide an industrial-scale public API so that you can seamlessly integrate your own applications. Transparency, attribution, accountability and auditability are now within your grasp.

Lirax Blockchain Features

Infinitely scalable

Bundling transactions makes it possible for us to overcome the limits of public blockchain technology.

Furthermore, thanks to the cryptographic structures we use, all the stamped data can be individually and indepentendly verified.

Privacy respectful

We never publish raw data or plain text to a public blockchain: We use unique cryptographic identifiers (hashes) in order not to reveal the original data.

Since hashes are one-way cryptographic algorithms, you can still prove that a determinate hash relates to your data, but nobody will ever be able to obtain your data by only having its hash.

Independently verifiable

Since we use public blockchains accessible by anyone in the world at zero cost, everything is transparent and extremely easy to verify while maintaining absolute privacy.

The cryptographic proofs that we generate are everything you or anyone needs to prove or verify that a given dataset existed at a certain point in time.

Machine friendly

Trust is a human creation. Machines don’t know about trust.

With Lirax Blockchian, the verification of the cryptographic proofs can be done in an automatic way, enabling secure machine to machine (M2M) transactions in a world in which Internet of Things is already a thing.

Lirax establishes verifiable truth

Proof is the evidence establishing a fact or the truth of a statement.
You own the data and control the processes—we create the proofs.

Solutions

We pioneered blockchain anchoring

Build immutable audit trails

Generate an immutable and independently record of all the activity in your document management system or in your whole organization

Accountability

No more need of trust in insiders or third parties. We replace trust with mathematical proof

Auditability

For the first time in human history, an immutable layer of transparency removes friction from your auditing needs

Attribution

Secure your data and mitigate risks with mathematical attribution that cannot be tampered with

Absolute data integrity

Systems and data used to be easy to modify, damage or destroy. Thanks to blockchain technology, for the first time in computer history, that is no longer the case.

Enterprise Security

Current security solutions are based on archaic fences. Companies advertise their complicated perimetral security systems as if they were impenetrable. On the other hand consider that everyday we hear about cyber security breaches at even the largest corporations. More so, you are not at all protected for internal breaches and insider threats.

Using our proprietary technology, we can embed unlimited data on the blockchain, having the certainty that such information will not be tampered with in the future. In this way it is possible to establish irrefutable real-time proof of integrity of your entire filesystems.

Insider Threat Mitigation

As we further use services to collaborate – as individuals – or integrate external networks that do not allow enterprises to fully control data endpoints, the risk of insider threats increases. We are more susceptible to insiders using their accesses to tamper with information. At Bitstone.Net we aim to mitigate this risk with our proprietary technology.

The database we use is secured by a network of thousands of computers distributed around the world. Each computer commits its computational power to make the database immutable and secure. We use cryptographic algorithms to register the unique identifier of each piece of information. If this information has been tampered with, a set of instructions can follow and policies previously configured can be triggered, such as alerting a human of the suspected behaviour, or to automatically revert to the previous clean status.

Data breach management

Many companies are proactive in their approach to cyber security. Enterprises must audit and insure their digital assets to ensure security. Such a consistent approach requires continuous verification of data.

Bitstone.Net allows for complete integrity of the enterprise’s data in real time. Keep pace of scaling your business and our technology will keep protecting you.

Critical Infrastructure Protection

Critical infrastructure protection is becoming absolutely necessary as even more digital threats endanger companies everyday.
There is no single software stack that is safe from data tampering.

We are able to track the state of entire filesystems, servers or networks, so you always know if an attacker gets in, and you can take the necessary preventive measures to minimize damage or to safeguard the penetrated systems.

Estonian ID Integration

Authenticate yourself at “verify.lirax.org” (active from 7.12.2018)

What is the Estonian e-Residency?

The Republic of Estonia is the first country to offer e-Residency — a transnational digital identity available to anyone in the world interested in administering a location-independent business online. e-Residency additionally enables secure and convenient digital services that facilitate credibility and trust online.

A few of its benefits are:

  • Digitally sign documents and contracts
  • Verify the authenticity of signed documents
  • Encrypt and transmit documents securely
  • Establish an Estonian company online
  • Administer the company from anywhere in the world
  • Conduct e-banking and remote money transfers
  • Access online payment service providers

Legal Validity

Digital signatures and authentication are legally equivalent to handwritten signatures and face-to-face identification in Estonia and between partners upon agreement anywhere around the world.

Recent changes in EU law mean that within the next few years Estonian e-residents will be able to easily identify themselves, access online services, and conduct business across Europe. The e-Resident ID card and services are built on state-of-the-art technological solutions, including 2048-bit public key encryption.

The smart ID card contains a microchip with two security certificates: one for authentication, called PIN1, and another for digital signing, called PIN2. PIN1 is a minimum 4-digit number used for authorization, and PIN2 is a minimum 5-digit number for digital signing.

Bitstone.Net API

The blockchain-powered, industrial-scale certification platform

Seamlessly integrate industrial-scale data certification into your own apps

The Bitstone.Net API adds a layer of transparency, attribution, accountability and auditability to your applications by connecting them to our infinitely scalable Blockchain Timestamping Architecture.

Made possible by Bitcoin and Ethereum

Our novel use of dual public blockchain anchoring gives you an unrivaled level of certainty, security and performance that beats that of any other distributed ledgers.

Infinitely scalable

Certifying millions of datasets? We’ve got you covered! With Lirax Platform, and our APIs, we can process up to exabytes of data inputs per second.

Privacy guaranteed

Bitstone.Net uses one-way cryptographic hash functions to identify records without disclosing sensitive information. Furthermore, we have no access to the original datasets.

No single point of failure

Thanks to public blockchain anchoring, all records made by our API are impossible to modify, damage or destroy. No trusted third party will be able to cheat on you.

Independently verifiable

The proofs documents generated when you use our API can be verified at no cost by any company, individual or computer in the world.

Valid globally, forever

The proof documents generated when you use our API rely on maths instead of trust. They will be valid in any part of the world, forever—even if Bitstone.Net disappeared.

Backed by PoW algorithms

Proof of Work—the solid consensus model behind Bitcoin and Ethereum—is the only one that guarantees no single point of failure.

Welcome to a new world of opportunities
Our API provides all you need to build tons of applications and businesses in a way that was never possible before.

Demonable document management

Integrate the document management solution with the Bitstone.Net API and take advantage of the unique power of blockchain technology.

  • Create tamper-proof records of the existence and integrity of your organization’s documents, files and business processes.
  • Protect the paternity and ownership of your creations and IP.
  • Verify the authenticity of signed documents and communications.
  • Generate immutable control tracks that keep track of all the changes that occur in a document.
icon-img

Data integrity: a change of paradigm

Data integrity monitoring tools such as Bitstone.Net Trailbots are defining a completely new approach to system security.

Instead of sitting out of monitored systems and trying to block attacks, these tools reside within them and are able to monitor, report and respond to every change that happens to critical files and registries.

This is a huge paradigm shift: now you can prevent, detect and act on any kind of attack on your systems, coming from the outside or from within your organization.

icon-img

Build the Internet of reliable things

In a world where the number of connected devices is growing so fast, maintaining their security and protecting us from attack is a big challenge.

Public blockchains provide an immutable and decentralized ledger where data sets from such devices can be anchored to authenticate their legitimacy.

With the Bitstone.Net APIs, the same IoT devices can even certify their own firmware and then prove their integrity to their peers, thus avoiding node hijacking or representation within mesh networks.

icon-img

Critical infrastructure is now the land of blockchain

The unparalleled level of security and security offered by public blockchains is perfect for critical infrastructures and other scenarios where there is a lot at stake.

In the last decades, with the obsolete transformation of the old SCADA systems, Information Technology systems and protocols have gained ground for operational technology, introducing huge challenges in their security (see Stuxnet for a well-known example).

With this in mind, the Bitstone.Net industrial certification API has been designed with the same availability, integrity, and confidentiality priorities common to all critical infrastructure systems.

icon-img

The history of a product, registered forever

Materials, raw materials and products have a history behind them, and those stories are sometimes of fundamental importance for their market value.

Eco-friendly soy beans, diamonds, pieces of art … You will now be able to demonstrate their origin and integrity at every stage of the supply chain without any possibility of tampering.

The API of Bitstone.Net allows you to adopt the exceptional characteristics of traceability, transparency and certainty that characterize the public blockchain and to apply them to demonstrate the provenance and ensure quality like never before.

icon-img

It’s time for business to compete on the things that matter most

Get more info or request a demo