SECURITY, BUILT FOR WEB3


The web is decentralizing, our security should too. We are upgrading security to power a truly decentralized web.


alt-text

SECURITY, BUILT FOR WEB3


The web is decentralizing, our security should too. We are upgrading security to power a truly decentralized web.


Hackers crack identity, not cryptography.

IDENTITY ≠ LOCATION

It's time to upgrade.
For mobile. For IoT. For Cloud. For Decentralized. For All.

alt-text

YOU ≠ LOCATION

Web Encryption today links and verifies identity to location, but 94% of all secure web traffic is verified by only 10 organizations.

alt-text

YOU ≠ DEVICE

SIM swapping, malware, malicious cookies, shady manufacturers... compromised hardware makes impersonation easy.

alt-text

YOU ≠ 3rd PARTIES

E-mail, Mobile #s, Internet Providers, Social Networks...Users are at the mercy of 3rd parties to preserve their digital identity.

Guer Builds ...


ONE PROTOCOL FOR SECURING WEB TRAFFIC, WITH DECENTRALIZED AUTHORITY, CRYPTOGRAPHIC IDENTITY, AND BETTER SECURITY.

Guer Builds ...

ONE PROTOCOL FOR SECURING WEB TRAFFIC, WITH DECENTRALIZED AUTHORITY, CRYPTOGRAPHIC IDENTITY, AND BETTER SECURITY.

alt-text

WEB3 HANDSHAKE PROTOCOL

Current web security - TLS - is based on location-based IP addresses, which require identity verification through vulnerable, centralized systems like Certificate Authorities.

GUER provides backwards-compatible encryption keys rooted in Web3's cryptographic addressing, empowering a truly decentralized way to communicate across networks.

alt-text
alt-text

AN IDENTITY USERS OWN

Using any type of crypto address, anyone can securely generate and distribute encryption keys without third parties.

No centralized authorities, cookies, SIM cards, or big data-ran accounts...just an Ethereum address.

All network participants, whether users, businesses, or decentralized applications, own their identity through their private key.

alt-text

UNIVERSAL MANAGEMENT SYSTEM

Blockchain-based management system provides network participants full control over their identity and their data.

Easily control permissions to data, personal information, devices, and other elements of your digital footprint through smart contracts, with social recovery safe-guards and user-friendly dashboards.

alt-text

PUTTING DEVELOPERS FIRST

Whether an experienced decentralized developer, or just starting off, GUER makes securely bringing your project to Web3 easy.

alt-text
FREE & OPEN
SOURCE

Implement however best for your project, whether directly into your app, using a Web3 wallet, or simply through a browser extension.

alt-text
WEB2
COMPATIBLE

The protocol is backwards compatible with existing standards like TLS, and libraries like OpenSSL, making Web2 upgrades easy.

alt-text
NEXT-GEN SECURITY
MADE EASY

The protocol is backwards compatible with existing standards like TLS, and libraries like OpenSSL, making Web2 upgrades easy.

BRINGING WEB3 TOGETHER

alt-text

THROUGH SECURITY & CONTROL

alt-text

BUILD STATELESS APPLICATIONS

Stateless means no cookies, no tracking, no complex compliance, no memory.

Using the best Web3 has to offer, allow users to easily import what data they want, all secured through next-gen encryption.

Host, serve, and store important data 100% decentralized, reducing your liability and risk.

Let your application provide services, rather than require custody of someone else's data.

alt-text
alt-text

MIGRATE YOUR WEB2 APP TO WEB3

Using the protocol opens all of Web3 to existing applications.

Easily migrate source code, host websites, store user and application data, and remotely virtualize to 100% decentralized solutions.

Embrace internet-native payment channels, eliminate centralized risk, and reduce costs associated with storing and securing data.

THE FOUNDATION OF A BETTER WEB

A clear path to self-sovereign digital existence

step1
Data Custody
as a Protocol

Data Custody as a Protocol Upgrading security infrastructure enables us to empower users and services to take control of their data without forfeiting privacy, trust, or functionality.

step2
Enhanced Content Distribution and DRM

A decentralized proxy re-encryption service enables data stored on networks to be securely distributed, capturing value and providing DRM as infrastructure.

step3
Complex
Digital Identity

A decentralized proxy re-encryption service enables data stored on networks to be securely distributed, capturing value and providing DRM as infrastructure.

step4
Decentralized
Permission Management

By bridging data storage and security, complex identity systems can be built in a decentralized manner, ranging from naming services to social identifiers like accreditations and credit history.

step5
Cryptographic
ID-based Security

End-to-end encryption based on cryptographically verifiable identity serves as the foundation for Web3, empowering users, IoT devices, cloud applications and dApps to securely exchange data.

alt-text
Data Custody as a protocol

Data Custody as a Protocol Upgrading security infrastructure enables us to empower users and services to take control of their data without forfeiting privacy, trust, or functionality.

alt-text
Enhanced Content Distribution and DRM

A decentralized proxy re-encryption service enables data stored on networks to be securely distributed, capturing value and providing DRM as infrastructure.

alt-text
Complex Digital Identity

By bridging data storage and security, complex identity systems can be built in a decentralized manner, ranging from naming services to social identifiers like accreditations and credit history.

alt-text
Decentralized Permission Management

With Web3 Security, smart contracts can effectively enforce permissions policies for data stored on decentralized storage networks like IPFS or Filecoin, without requiring hosted, centralized services

alt-text
Cryptographic ID-based Security

End-to-end encryption based on cryptographically verifiable identity serves as the foundation for Web3, empowering users, IoT devices, cloud applications and dApps to securely exchange data


BUILD NOW!

A clear path to self-sovereign digital existence

This example presumes some familiarity with JavaScript and Web3. Need a refresher? connecting your site with web3

THESE DEMOS ARE IN DEVELOPMENT. PLEASE DO NOT STORE ANY SENSITIVE OR IMPORTANT DATA.


GUER is currently deployed on SKALE testnet, to interact with any of our demos you will need to integrate the SKALE testnet into your metamask, and grab a small amount of SKALE testnet tokens to interact with it.

1. Import

Add a few lines of code to your project:

2. Integrate

Grab existing data or add register new address

3. Use

Store data, use existing data, or manage users

EthereumSKALEIPFSGITCOIN
EthereumSKALEIPFSGITCOIN