Take back the control over your Identity.

The internet has run on a faulty, copy-based architecture for over 50 years. Let's fix the foundation.

This is an open research project.

Star on GitHub
The Old Way

Scattered & Trapped

You fill out forms. Your data is permanently copied and stored in thousands of vulnerable databases.

You have zero visibility into who holds your data.
Impossible to update everywhere when your info changes.
You can't truly delete it once it's sent.
The Revoked Way

Sovereign & Revocable

You keep the master copy in your Hub. Companies just plug into it. You hold the kill switch.

Update your info once, and the live connection syncs everywhere.
You see a unified dashboard of exactly who has access right now.
Click one button to instantly sever their access and trigger deletion.

The Core Architecture.

The four pillars that make true, programmable data sovereignty possible.

1. The Vault

Your personal encrypted database. It securely holds your raw information. Nothing goes in or out of this vault without your explicit permission.

2. Self-Hostable

Absolute independence. There is no central Revoked server. You decide exactly where your Hub lives—on your phone, your home server, or a private cloud.

3. Requests

Instead of filling out web forms, companies send your Hub a Request. It transparently outlines exactly what data points they need and why.

4. Shares

Your outgoing data stream. You decide exactly which parts of your Vault to share outwards based on what was requested.

Request
Share
Active Connection
Experimental Vision

Engineered for absolute control.

Everything you need to host, manage, and monitor your personal digital footprint. We are building a robust suite of tools for total data sovereignty.

End-to-End Encryption

Zero-knowledge architecture. Your vault data is encrypted client-side before touching your Hub, ensuring no server compromise can expose your entries.

Federated Mesh

Interact seamlessly across different self-hosted hubs using verified domains and public key cryptography.

DNS Verification

Cryptographically tie your instance to a custom domain. Provides verified badges for incoming requests, eliminating phishing attempts.

Mobile-First Enclaves

Dedicated mobile apps to protect against malicious web extensions. Unlock OS-level secure cryptography and frictionless deep-linking flows.

Multi-Organization RBAC

Enterprise-grade access control. Manage Personal spaces seamlessly alongside complex Business organizations with precise permission scoping.

Deep Bookmarking

A robust "Shared with Me" and "Shared by Me" ledger to immutably track every data flow to and from your hub.

Live Telemetry

Health checks continuously monitor the status of outbound shares (Active, Paused, Revoked, Stale) and alert you of anomalies.

Temporal Hooks

Automated reminders for time-sensitive data entries (like passport renewals) before they go stale.