signal: +1 415 494 7530 

© 2019 Muinín P.B.C.

Stealth Mode


A full-platform of trustworthy computing systems: with a single platform that provides autonomous determination of integrity: covering logistics, supply, manufacture and end user system state.

  1. There are now two general approaches to cybersecurity vulnerability challenges:

    1. Patching vulnerabilities after they are identified

    2. Incremental improvements in the security-worthiness of individual elements: software, hardware, supply chain

  2. We propose instead and are building an integrated approach that includes:

    1. Integrating oversight of how systems are made and supplied with their final state in operation

    2. Building secure data fields on states in origin, in partnership with trusted manufacturers, and connecting these data to states of machines as used

    3. Auditable / reproducible software stacks