IT'S TIME TO BUILD TRUST
AVEXER TRUST NETWORKS
Avexer lets you create trusted relationships and easily build and manage trust networks with real people.
Avexer is an application and a layer that extends the trust that exists between individuals and organizations in the real world into their digital identities across multiple platforms.
At its core is the Avexer Identity Model, which is built on three principles:
Identities belong to the individual or the organization, not a platform provider. Only by making the individual the sovereign of their own digital identity, can we trust that identity
Personal Trust Score
Ability to trust a digital identity needs to be explicit and easy to understand. Trust created in the real world is stronger than trust based purely on algorithms
Trust in the identity is meaningless if the security of the communication is compromised. By enabling channel agnostic communication across multiple platforms can we maximize confidentiality of all communication
Avexer originated from an experimental research project by a national defense forces, which explored opportunities to develop the readiness and capabilities of military forces and civil defense by innovating the use of commercial off-the-shelf (COTS) technologies and services.
During these exercises, a team of volunteers, who later went on to found Avexer, came up with the concept of trust networks. The idea was to utilize COTS devices and messaging services to increase situational awareness, to empower ad-hoc group formation and enable command, control, and communications.
Since then, working with trust networking in many contexts, military and otherwise, the founders realized that trust networks based on robust digital identities and usable over many different platforms are exactly what we need in business and in our personal lives as well. After all, global macro trends, such as organizational interdependence, cross-border business, and gig economy are driving the importance of all kinds of networks for both individuals and organisations.
From this realization, the founders set up to create a platform and applications that help people and organizations to build trust in otherwise trustless digital world and so Avexer was born.
WHY ARE WE DOING THIS?
In the digital world, we do not interact with people but with digital identities that represent the person. The problem is that most of the platforms we increasingly rely on to manage our personal and professional lives were never designed for trust.
in order to extend the trust we have with people and organizations in the real world, we need to address the how we think about identity, how we manage our networks, and how we can communicate with trust.
The internet is borderless, and there is no single source of truth when it comes to digital identities. An individual’s digital identity consists of several different identifiers, including different profiles in various social media and communication platforms, email addresses or phone numbers. The problem is that there are no barriers to for anyone to set up any number of email addresses as well as profiles, including fake ones, on the major social media platforms, and even spoof SIM cards.
Since the different identifiers are rarely constant, and since individuals tend to share different identifiers with different people, maintaining and updating what ultimately determines an individual’s digital identity is often logistically difficult. And this does not extend to just maintaining one’s own identifiers, but also to keeping track of other people’s details who form your social and professional networks.
A new paradigm is needed where the individual or organization have a reliable digital identity that is fully controlled by the owner of the identity and not by a third party.
Human existence is based on networks. Our lives take place inside several personal and professional networks, which often overlap significantly. Furthermore, networks themselves are interconnected with other networks, as ultimately companies or other formal organizations are nothing but networks of individuals connected by a shared purpose.
Multiple macro trends, such as gig-economy, organizational interdependence, cross-border trade and automation are re-shaping how organizations need to manage their networks. In government and military context, the need for network management to ensure effective command, control and communication has already been recognized.
Individuals have also seen a shift in how they interact and rely on their personal and professional networks.
Individuals and organizations need better tools to govern and visualize the networks that they are part of or manage. Unlike the common social media platforms, where connections are binary, or communication platforms, that offer only limited governance tools, users need more flexibility to set the rules on which a network is governed, in order to truly capture the opportunities their networks provide.
In the digital world, the fundamental risk for trust is that the digital identity does not reflect the real person.If you cannot trust that the digital identity is actually the person you think it is, how can you trust the network of these identities?
A new system is required that allows the verification of the identity of the individual in a digital network, similarly as happens in the physical world.
We do not need another central trusted third party or verification services, but instead a model that allow all users to utilize their own networks of contacts, as well as any number of verification services or organizations to verify that the digital identities represent real people.
There is no shortage of available secure messaging platforms. Despite this, some fundamental issues remain.
From an organizational perspective, attesting the security of the encryption is a major issue. Most messaging platforms are black boxes, where the user cannot audit the encryption algorithms, or indeed use their own.
From an individual’s perspective, we are often forced to use a platform simply because it is the one used by most, if not all, of our contacts. Organizations are not immune to this either, as even with best efforts, it is difficult to get your employees to use a system, if a more familiar and easier system is available.
A new approach is therefore needed that allows the users to guarantee the security of the communication, while giving the flexibility to use different applications for the actual transit of the communication. Users will need the flexibility to use different applications depending on circumstances or geographies, and give them control over the encryption of the communications, if required.