Common Prefix

We are a small team of scientists and software engineers offering blockchain science consulting services.

We work using rigorous cryptographic techniques to design simple and provably secure protocols from first principles and guide developers in implementing them successfully. Our consulting and audits pertain to theoretical cryptographic protocol analyses as well as the pragmatic auditing of implementations in both core consensus technologies and application layer smart contracts.

Team

Our team consists of both academics and industry professionals. On the scientific side, we focus on consensus foundations, with specialists in the areas of proof-of-stake, auctions, layer 2s, sharding, channels, bootstrapping, light clients, wallets, smart contracts, and interoperability. On the engineering side, our team comprises experts in smart contract development, testing, and auditing, full-stack software engineering, devops, and operational security.

Meet the team

Projects

We currently work with companies ranging from Layer-1 blockchains to smart contract protocols. Our services span from theoretical cryptographic design to hands-on engineering, with our expertise lying in the junction between both worlds.

At the theory level, we analyze protocol design, define the desiderata, rigorously document constructions, and pinpoint errors in the protocols before helping our clients resolve them. In collaboration with our client teams, we show that their protocols are secure from a mathematical point of view, by stating and proving safety and liveness results in the form of an academic paper.

On the implementation side, we ensure the implementation matches the theory of the cryptography papers, whether it's an L1 implementation in GoLang, or a DeFi lending protocol in Solidity and TypeScript. Our teams work on auditing, testing, ensuring code quality, and even on developing our clients' smart contracts. At the highest level, we perform due diligence and deliver technical reports making sure that our clients choose the most appropriate and technically sound partners for their business. Lastly, we help our clients secure their infrastructure by ensuring that their operational security practices and devops follow the latest industry best practices.