ADAPT — re-engineering the web architecture for increased trust and security
Build internet applications as a mesh of device-agnostic data nodes with end-to-end encryption. Eliminate reliance on back-end service-providers, prioritize the user, move data to the front end, eliminate data honeypots.
The Web is outdated.
Modern Internet applications require a back-end to store and manage application data.
The asymmetric client-server architecture of Internet applications built with the current Web-development tools introduces a vast attack surface that is impossible to secure.
To reduce the attack surface of internet applications, data must be distributed and partly placed on the front-end of the application. However, no tools exist that allow this to be done simply and reliably.
Post-Web internet applications require the use of advanced modern cryptography, such as zero-knowledge proofs for remote trusted execution, trusted execution environments for data privacy and transaction-based authentication for interoperability and activity delegation.
The problem is that these technologies are exceptionally difficult to use and rarely integrate together in the same development environment. Yet post-Web applications require simultaneous use of many such technologies.
_01/
Blockchain addresses some trust problems in finance, but does not address the lack of trust in the broader web application landscape.
_02/
Distributed databases, CRDT, IPFS, and other similar technologies do not provide the necessary level of security, access management, and data ownership.
_03/
Enterprise systems typically consist of a variety of disparate data processing components treated as black boxes and do not deal with security issues related to global user bases and distributed workforce operations.
To reduce the attack surface of internet applications, data must be distributed and partly placed on the front-end of the application. However, no tools exist that allow this to be done simply and reliably.
_01/
Blockchain addresses some trust problems in finance, but does not address the lack of trust in the broader web application landscape.
Post-Web internet applications require the use of advanced modern cryptography, such as zero-knowledge proofs for remote trusted execution, trusted execution environments for data privacy and transaction-based authentication for interoperability and activity delegation.
_02/
Distributed databases, CRDT, IPFS, and other similar technologies do not provide the necessary level of security, access management, and data ownership.
The problem is that these technologies are exceptionally difficult to use and rarely integrate together in the same development environment. Yet post-Web applications require simultaneous use of many such technologies.
_03/
Enterprise systems typically consist of a variety of disparate data processing components treated as black boxes and do not deal with security issues related to global user bases and distributed workforce operations.
ADAPT framework is a developer environment for building secure data meshes, replacing the single back-end within applications.
Traditional Web3 Architecture
ADAPT Architecture
ADAPT is a developer toolkit for building full featured internet applications utilizing a connected mesh of independent data nodes with end-to-end encryption and a suite of security tools. Mesh applications enable cloudless authentication, breaking up of data honeypots, and self-custody of data by users — architectural advancements that improve overall data security.
Unlike existing frameworks, ADAPT takes a radical approach to safety by eliminating or limiting the super user/admin role in your software. The market for the system comprises any software sector dealing with critical and highly sensitive data, such as medical, legal, financial and proprietary information.
ADAPT replaces the application back-end with a distributed data fabric in which each component can have its own security protection, independently reside on the front-end or in the cloud, perform independent security verification, and provide a variety of data custody choices — all within the same connected environment.
Why ADAPT?
Simplified usage of cryptography and hardware-based security
ADAPT makes it exceptionally easy to utilize cryptography and hardware-based security primitives. Unlike competitors, ADAPT simplifies the process of building full-featured internet applications using trusted execution environments, even in distributed environments. It automates the sensitive software attestation process while accounting for multiple software versions running on the same network. Additionally, it enhances developer usability for advanced cryptography, such as general computation zero-knowledge proofs.
Identical functionality on front-end and server side
ADAPT's containers offer seamless functionality on both the front-end and server side. This unique advantage enables applications to store structured data and execute sensitive business logic on the front-end. ADAPT empowers non-custodial data models — allowing applications to operate with data that has no owner while enhancing flexibility and security.
Addressing software lifecycle and supply chain challenges
ADAPT recognizes the sensitivity of trusted code to even subtle changes in software and libraries. By addressing these issues at the ecosystem and architecture level, ADAPT ensures the long-term security and stability of decentralized software, minimizing potential risks.
Sensitive data storage
ADAPT is suitable for organizations dealing with sensitive data, such as medical institutions, financial organizations, and legal firms.
Enterprise data sharing
ADAPT enables secure joint market analysis, IoT data aggregation, and information sharing with strict security constraints.
Finance
ADAPT supports a variety of financial applications, including dark pool trading, collateral rollover, lending and derivative trading, KYC processes, and identity management.
Web3
ADAPT is well-suited for Web3 applications, such as wallets, key management, signing services, and bridging solutions for blockchain networks.
SaaS
ADAPT offers decentralized data storage models, empowering SaaS providers to enhance data security and to offer non-custodial data solutions.
IoT and devices
ADAPT facilitates authentication, safe data sharing, and the development of robust and secure IoT applications.
ADAPT seamlessly integrates into existing infrastructures and supports various operating systems and browsers
By following these steps, you can seamlessly integrate ADAPT into your existing infrastructure while ensuring compatibility with different operating systems and browsers.
1
Identify ADAPT node types
Determine the types of ADAPT nodes present in your application, such as front-end nodes with different credentials, back-end data nodes, and orchestrator/directory nodes.
2
Define security environments and requirements
Specify the security environments and requirements for each node type, considering factors like data custody, trust guarantees, and backup/monitoring needs of each node type.
3
Define transaction APIs
Define a transaction API for each node type, encompassing all messages the node can receive and respond to. Front-end embedded node APIs may include user-initiated interactions without cryptographic verification.
4
Establish key exchange process
Define a process for nodes to connect and exchange keys with each other to enable secure message exchange. For example, providing the orchestrator node with a system-wide credential for overseeing key exchanges, as well as a spectrum of other possible protocols defined by the ADAPT standard library.
5
Develop business logic
Utilize ADAPT's special-purpose programming language and standard libraries to develop the business logic that implements the defined APIs.
6
Test and deploy
Test the business logic in a test deployment using ADAPT's test driver to validate message exchange among nodes. Integrate ADAPT nodes with the front-end application or follow the provided examples for back-end deployment.
Aleksandr Bulkin
Co-Founder & CEO
David Sparks
Co-Founder & COO
Nick Allen
Strategic Advisor
Tim Dokshitzer
Chief Zero Knowledge Officer
Vitalii Shakhmatov
Senior C++ Developer
Filipp Kucheryavy
Lead DevOps Engineer
Denis Kuznetsov
Software Developer
Ivan Malivanchuk
Software Engineer
Shailesh Nair
Software Engineer
Dave Walker
Documentation Engineer