Take back the control over your Identity.
The internet has run on a faulty, copy-based architecture for over 50 years. Let's fix the foundation.
This is an open research project.
Star on GitHubScattered & Trapped
You fill out forms. Your data is permanently copied and stored in thousands of vulnerable databases.
Sovereign & Revocable
You keep the master copy in your Hub. Companies just plug into it. You hold the kill switch.
The Core Architecture.
The four pillars that make true, programmable data sovereignty possible.
1. The Vault
Your personal encrypted database. It securely holds your raw information. Nothing goes in or out of this vault without your explicit permission.
2. Self-Hostable
Absolute independence. There is no central Revoked server. You decide exactly where your Hub lives—on your phone, your home server, or a private cloud.
3. Requests
Instead of filling out web forms, companies send your Hub a Request. It transparently outlines exactly what data points they need and why.
4. Shares
Your outgoing data stream. You decide exactly which parts of your Vault to share outwards based on what was requested.
Engineered for absolute control.
Everything you need to host, manage, and monitor your personal digital footprint. We are building a robust suite of tools for total data sovereignty.
End-to-End Encryption
Zero-knowledge architecture. Your vault data is encrypted client-side before touching your Hub, ensuring no server compromise can expose your entries.
Federated Mesh
Interact seamlessly across different self-hosted hubs using verified domains and public key cryptography.
DNS Verification
Cryptographically tie your instance to a custom domain. Provides verified badges for incoming requests, eliminating phishing attempts.
Mobile-First Enclaves
Dedicated mobile apps to protect against malicious web extensions. Unlock OS-level secure cryptography and frictionless deep-linking flows.
Multi-Organization RBAC
Enterprise-grade access control. Manage Personal spaces seamlessly alongside complex Business organizations with precise permission scoping.
Deep Bookmarking
A robust "Shared with Me" and "Shared by Me" ledger to immutably track every data flow to and from your hub.
Live Telemetry
Health checks continuously monitor the status of outbound shares (Active, Paused, Revoked, Stale) and alert you of anomalies.
Temporal Hooks
Automated reminders for time-sensitive data entries (like passport renewals) before they go stale.