Sovereignty by Cryptography
Your data is not protected by our "terms of service" — it is protected by the laws of mathematics. If you do not sign the request, the vault does not open. Even we cannot bypass this.
Self-sovereign personal data store
TurtleShell gives every DID a private store with clean authority, portable records, and room to move.
Cryptographic authority
Owners grant exactly what an app or teammate needs, then keep the root authority.
Choose your angle
For people and product teams
Bring records and permissions into a shell that belongs to the owner, not the platform.
Security Manifesto
Five principles that govern how TurtleShell handles your data.
Your data is not protected by our "terms of service" — it is protected by the laws of mathematics. If you do not sign the request, the vault does not open. Even we cannot bypass this.
In the physical world, you have a front door. In Turtle Shell, your data lives in a physically isolated compartment. There are no "shared tables" where a leak in one can lead to a flood in another.
You carry your shell; you are not trapped in ours. True sovereignty means you can pack your data, your identities, and your permissions and move to any node in the world without losing a single bit of authority.
We do not need to know who you are to know you are authorized. By using ZCAP-LD, we replace invasive profiles with cryptographic "hall passes" that grant specific access without requiring a name.
We assume the infrastructure is compromised. Therefore, data is encrypted at rest, in transit, and gated by keys that never leave your control.
Platform
The DID holder stays in charge. No hidden platform superpowers.
Grant only the slice of power a workflow needs, then revoke it when done.
Identity, data, and history are built to travel across nodes and deployments.