Security isn't
a feature.
It's the product.
We designed Bridgekyc around a single constraint: your personal data should never reach a blockchain, a database, or any persistent store. Every architectural decision flows from that commitment.
Every control.
Verified in real-time.
Our security posture is continuously monitored across 10 critical control categories. The terminal to the right runs a live check on every system — no mocked results, no static badges.
10 / 10
Controls passing
0
Critical issues
99.98%
Uptime (last 90d)
< 72h
DSAR response SLA
Where your data goes.
And where it doesn't.
Four stages. Full transparency on what happens at each step. Nothing is vague. Nothing is hidden.
Capture
Document photo + liveness check captured in-browser via encrypted session.
Never touches our servers unencrypted. TLS 1.3 in transit.
Process
Neural OCR + liveness AI runs in isolated edge environment. Results hashed.
Raw biometric data deleted immediately post-analysis.
Prove
Groth16 ZKP circuit generates a cryptographic proof of compliance.
Proof confirms e.g. 'Over 18, Not Sanctioned' — reveals nothing else.
Mint
Proof hash written to Ethereum / Tron as Soulbound NFT. Zero PII on-chain.
Gas fully sponsored. EIP-5192 token bound permanently to wallet.
We modelled the attacks.
Then we eliminated them.
Public threat modelling is rare in this industry. We publish ours because transparency is the foundation of institutional trust.
Data exfiltration
Personal documents and biometrics are processed in isolated edge environments and deleted within 30 days. Nothing sensitive is written to persistent storage beyond an irreversible hash.
On-chain deanonymisation
Only a Groth16 ZKP hash is written to the chain — not the document, face, or any personally identifiable field. The proof confirms validity without revealing what was verified.
Credential spoofing
Soulbound tokens are non-transferable by EIP-5192 specification. Smart contract revocation handles AML-triggered invalidation. Tokens cannot be sold, moved, or forged.
Regulatory non-compliance
Built against GDPR Article 25, FATF Travel Rule, and AML Directive requirements from day one. ISO 27001 certification with continuous control monitoring and annual SOC 2 audit.
Verified by third parties.
Not self-reported.
Security claims without audits are marketing. Ours are independently verified, annually renewed, and available to institutional partners.
ISO 27001
Information Security
Full certification covering 122 controls across our information security management system. Annual surveillance audit by BSI Group.
SOC 2 Type II
Trust Services
Annual third-party audit covering Security, Availability, and Confidentiality trust service criteria. Report available under NDA.
GDPR
Article 25 — Privacy by Design
Verified compliance with privacy-by-design principles. DPA appointed. Data residency options for EU customers. DSAR response < 72h.
Smart Contract Audit
Certik + Quantstamp
All on-chain contracts audited by two independent security firms. Zero critical findings. Full audit reports public on GitHub.
Found a vulnerability?
Tell us first.
We operate a responsible disclosure programme. Security researchers who report valid vulnerabilities are acknowledged, rewarded, and treated with professional respect. We commit to a 72-hour response SLA.
Report privately
Email [email protected] with a clear description and reproduction steps. PGP key available on request.
72h acknowledgement
We confirm receipt and assign a severity. You get a reference number and a named point of contact.
Fix & reward
We patch, verify, and reward according to CVSS severity. Critical findings receive up to $10,000.
Coordinated disclosure
We work with you on timing. Public disclosure happens once a fix is deployed and verified.
Ready to verify
Trust that's verifiable.
Security that's auditable.
Full audit reports available to institutional partners under NDA. Contact our compliance team to request documentation.