Common Prefix

We are a small team of scientists and software engineers offering blockchain science consulting services.

We work using rigorous cryptographic techniques to design simple, provably secure protocols from first principles and guide their implementation. Our consulting and auditing pertain to theoretical cryptographic protocol analyses as well as the pragmatic auditing of implementations in both core consensus technologies and application layer smart contracts.


Our team consists of both academics and industry professionals. On the scientific side, we focus on consensus foundations, with specialists in the areas of proof-of-stake, auctions, Layer-2s, sharding, channels, bootstrapping, light clients, wallets, smart contracts, and interoperability. On the engineering side, our team comprises experts in smart contract development, testing, and auditing, full-stack software engineering, devops, and operational security.

Meet the team


We currently work with companies ranging from Layer-1 blockchains to smart contract protocols. Our services span from theoretical cryptographic design to hands-on engineering, with our expertise lying in the junction between both worlds.

At the theory level, we analyze protocol design, define the desiderata, rigorously document constructions, and pinpoint errors in the protocols before helping our clients resolve them. In collaboration with our client teams, we show that their protocols are secure from a mathematical point of view, by stating and proving safety and liveness results in the form of an academic paper.

On the implementation side, we ensure the implementation matches the theory of the cryptography papers. Our teams work on auditing, testing, ensuring code quality, and even on developing our clients' smart contracts. At the highest level, we perform due diligence and deliver technical reports, helping our clients choose the most appropriate and technically sound partners for their business. Lastly, we aid our clients in securing their infrastructure by ensuring that their operational security practices and devops follow the latest industry best practices.