We will be undergoing planned maintenance on January 16th, 2026 at 1:00pm UTC. Please make sure to save your work.

Inspiration

During startup due diligence, founders are asked to prove when data existed, whether it changed, and who controlled it. Existing answers rely on internal logs and cloud audits, which are self-reported and non-independent. This gap inspired EnKrypto.

What it does

EnKrypto acts as a digital notary for data. It creates cryptographic proof that specific data existed at a specific time and has not been modified since—without storing files or accessing content.

How we built it

Data is hashed using SHA-256, time-anchored on an immutable public ledger (Polygon), and recorded in an append-only proof registry. A public API allows anyone to independently verify proofs.

Challenges we ran into

The main challenge was building trust without custody—providing strong guarantees while avoiding file storage, content access, or subjective judgment.

Accomplishments that we're proud of

  • Built a neutral, tamper-evident proof system
  • Enabled independent third-party verification
  • Designed a minimal, vendor-neutral architecture

What we learned

Proof must be created before scrutiny begins. Timing is the real problem, not tools. Minimal systems increase trust.

What's next for EnKrypto

Expand enterprise integrations, support more compliance checkpoints, and position EnKrypto as a standard proof layer for high-stakes data.

Built With

Share this project:

Updates